Dark Mode

Settings

Capec-50 Detail

Password Recovery Exploitation

Standard Software Likelihood: Medium Typical Severity: High

Parents: 212

Threats: T295

Description

An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure.

Extended Description

Most of them use only one security question. For instance, mother's maiden name tends to be a fairly popular one. Unfortunately in many cases this information is not very hard to find, especially if the attacker knows the legitimate user. These generic security questions are also re-used across many applications, thus making them even more insecure. An attacker could for instance overhear a coworker talking to a bank representative at the work place and supplying their mother's maiden name for verification purposes. An attacker can then try to log in into one of the victim's accounts, click on "forgot password" and there is a good chance that the security question there will be to provide mother's maiden name. A weak password recovery scheme totally undermines the effectiveness of a strong password scheme.
External ID Source Link Description
CAPEC-50 capec https://capec.mitre.org/data/definitions/50.html
CWE-522 cwe http://cwe.mitre.org/data/definitions/522.html
CWE-640 cwe http://cwe.mitre.org/data/definitions/640.html
REF-429 reference_from_CAPEC http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt Advisory: Unauthorized password recovery in phpBannerExchange, 2006, RedTeam Pentesting GmbH
Explore
  1. Understand the password recovery mechanism and how it works.

Exploit
  1. Find a weakness in the password recovery mechanism and exploit it. For instance, a weakness may be that a standard single security question is used with an easy to determine answer.

  1. The system allows users to recover their passwords and gain access back into the system.
  2. Password recovery mechanism has been designed or implemented insecurely.
  3. Password recovery mechanism relies only on something the user knows and not something the user has.
  4. No third party intervention is required to use the password recovery mechanism.
  1. For a brute force attack one would need a machine with sufficient CPU, RAM and HD.
Low Medium
Brute force attack
Social engineering and more sophisticated technical attacks.
Authorization Access Control Confidentiality
Gain Privileges Gain Privileges Gain Privileges
  1. An attacker clicks on the "forgot password" and is presented with a single security question. The question is regarding the name of the first dog of the user. The system does not limit the number of attempts to provide the dog's name. An attacker goes through a list of 100 most popular dog names and finds the right name, thus getting the ability to reset the password and access the system.
  2. phpBanner Exchange is a PHP script (using the mySQL database) that facilitates the running of a banner exchange without extensive knowledge of PHP or mySQL. A SQL injection was discovered in the password recovery module of the system that allows recovering an arbitrary user's password and taking over their account. The problem is due to faulty input sanitization in the phpBannerExchange, specifically the e-mail address of the user which is requested by the password recovery module. The e-mail address requested by the password recovery module on the resetpw.php page. That e-mail address is validated with the following regular expression: if(!eregi("^[_a-z0-9-]+(\\.[_a-z0-9-]+)@[a-z0-9-]+(\\.[a-z0-9-]+)(\\.[a-z]{2,3})$", $email)){ A bug in the implementation of eregi() allows to pass additional character using a null byte "\0". Since eregi() is implemented in C, the variable $email is treated as a zero-terminated string. All characters following the Null Byte will not be recognized by the regular expression. So an e-mail address can be provided that includes the special character " ' " to break the SQL query below (and it will not be rejected by the regular expression because of the null byte trick). So a SQL injection becomes possible: $get_info=mysql_query("select from banneruser whereemail='$email' "); This query will return a non-zero result set even though the email supplied (attacker's email) is not in the database. Then a new password for the user is generated and sent to the $email address, an e-mail address controlled by the attacker. An attacker can then log in into the system.See also: CVE-2006-3013