Project

General

Profile

Actions

Feature #260

closed

Feature #235: [Security Audit Round 2 ]

[Security Audit Round 2 ] OTP Bruteforce (Reapeated)

Added by Kalyan Battula 12 months ago. Updated 11 months ago.

Status:
Closed
Priority:
High
Category:
-
Target version:
Start date:
01/05/2024
Due date:
% Done:

0%

Estimated time:
Deployed In:
Category:

Description

OTP Bruteforce (Repeated)
CWE : CWE-799
Description :
Application allows users to submit multiple wrong OTPs which lead to bruteforce
attacks to guess the correct OTP.
Affected Path(s) :
https://earogya.satragroup.in/login *-Applicable to entire application
Impact :
Account takeover can be possible by using this vulnerability.
Evidence/Proof Of Concept :
Step 1: Application accepting multiple OTP requests which leads to brute force the OTP by
submitting multiple requests.

Step 2: Functionalilty issue

Recommendation :
It is recommended to allow only 3 to 5 wrong attempts of OTPs. After the limit block the
mobile number for some time or provide a new OTP.


Files

Actions #1

Updated by Harish Beechani 12 months ago

  • Status changed from New to Resolved
Actions #2

Updated by Sivakanth Kesiraju 12 months ago

  • Target version set to Sprint 1 (29th April - 3rd May)
Actions #3

Updated by Sivakanth Kesiraju 12 months ago

  • Target version changed from Sprint 1 (29th April - 3rd May) to Security Audit
Actions #4

Updated by Harish Beechani 11 months ago

  • Assignee set to Harish Beechani
Actions #5

Updated by Harish Beechani 11 months ago

  • Status changed from Resolved to Ready for Prod
Actions #6

Updated by Kalyan Battula 11 months ago

  • Status changed from Ready for Prod to Closed
  • Assignee changed from Harish Beechani to Kalyan Battula

working fine now not allowing multiple Opt attempts

Actions

Also available in: Atom PDF