Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Weak Password Policy and password didn't have a limit #216

Open
bohdan-shulha opened this issue Oct 6, 2024 · 0 comments
Open

Weak Password Policy and password didn't have a limit #216

bohdan-shulha opened this issue Oct 6, 2024 · 0 comments

Comments

@bohdan-shulha
Copy link
Contributor

Reported by Kunal Mhaske [email protected]

Vulnerability Name: Weak Password Policy and password didn't have a limit.

Target URL: https://ctl.ptah.sh/

Vulnerable URL: https://ctl.ptah.sh/user/profile

Description:
your website allows users to set their password too simply, at this time, I can put my password to 12345678 Determine the resistance of the application against brute force password guessing using available password dictionaries by evaluating the length, complexity, reuse, and aging requirements of passwords.
it would be best if you made a password policy to protect your user, Uppercase, and lowercase. as it makes it much more secure it will be acceptable

Step to reproduce
change the password to 12345678 with a password reset

Impact:
a website allowing users to set their password too simple

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant