Security
Headlines
HeadlinesLatestCVEs

Headline

Bookwyrm 0.4.3 Authentication Bypass

Bookwyrm versions 0.4.3 and below suffer from an authentication bypass vulnerability due to a lack of rate limiting on OTP checks.

Packet Storm
#vulnerability#mac#git#auth
# Exploit Title: Bookwyrm v0.4.3 - Authentication Bypass# Date: 2022-08-4# Exploit Author: Akshay Ravi# Vendor Homepage: https://github.com/bookwyrm-social/bookwyrm# Software Link: https://github.com/bookwyrm-social/bookwyrm/releases/tag/v0.4.3# Version: <= 4.0.3# Tested on: MacOS Monterey# CVE: CVE-2022-2651# Original Report Link: https://huntr.dev/bounties/428eee94-f1a0-45d0-9e25-318641115550/Description: Email Verification Bypass Leads To Account Takeover in bookwyrm-social/bookwyrm v0.4.3 Due To Lack Of Ratelimit Protection# Steps to reproduce:1. Create a acount with victims email id2. When the account is created, its ask for email confirmation via validating OTP  Endpoint: https://site/confirm-email3. Enter any random OTP and try to perfrom bruteforce attack and if otp matches, We can takeover that account

Related news

CVE-2022-2651: Email Verification Bypass Leads To Account Takeover in bookwyrm

Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution