Uploaded image for project: 'Jackrabbit Oak'
  1. Jackrabbit Oak
  2. OAK-7506

Prevent user enumeration by exploiting time delay vulnerability

Attach filesAttach ScreenshotVotersWatch issueWatchersCreate sub-taskLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Closed
    • Minor
    • Resolution: Fixed
    • None
    • 1.10.0, 1.9.4
    • security
    • None

    Description

      Pasting here the improvement request: "If the server response is different for existing and not existing usernames, the attacker is able to enumerate valid usernames with guessing attacks. He is thereby able to focus his password guessing attacks to the existing accounts."

      The fix for this particular issue seems trivial, at the cost of making the login operation slower in the case the user doesn't actually exist.

      Attachments

        Activity

          This comment will be Viewable by All Users Viewable by All Users
          Cancel

          People

            stillalex Alex Deparvu
            stillalex Alex Deparvu
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Slack

                Issue deployment