Enumerable Integer-Based ID
Test name: User ID Enumeration
Summary |
---|
An enumeration attack allows an attacker to check whether a user exists in the system by looking for differences in the server response based on the validity of submitted credentials/user's information. That will not allow the attackers to log in to the system immediately, but it gives them a part of the necessary information.
The main targets for this attack are places where the attacker can enter data about an assumed user and make conclusions depending on the response from the server. The most vulnerable areas for enumeration are a site login page and the "forgot password" functionality.
Revealing the vulnerability:
- Submit user’s information via one of the pages / API.
- Analyze the response from the server. Find differences in the response for the valid and invalid request data.
Impact |
---|
- Data leakage
- Access to unauthorized information
Example |
---|
Example 1:
- On the login page, the attacker enters one of the assumed usernames and any password to submit the login request.
- If the server responds differently depending on the entered username, the attacker will be able to conclude whether a user with the corresponding username exists in the system:
- The response from the server looks like "Login failed, invalid username", the attacker concludes that this username does not exist in the system.
- The response from the server looks like "Login failed, invalid password", the attacker concludes that this username exists in the system.
Example 2:
- On the "forgot password" page, the attacker enters one of the assumed usernames to submit the password reset request.
- If the server responds differently depending on the entered username, the attacker will be able to conclude whether a user with the corresponding username exists in the system:
- The response from the server looks like "This email address doesn't exist in our database", the attacker concludes that this username does not exist in the system.
- The response from the server looks like "We just sent you a password reset link", the attacker concludes that this username exists in the system.
Location |
---|
The issue can be found in the source code on the server side.
Remedy suggestions |
---|
-
An application should respond (both HTTP and HTML) in a generic manner:
- Using any of the authentication mechanisms (login, password reset or password recovery), an application must respond with a generic error message regardless of whether:
- The user ID or password was incorrect.
- The account does not exist.
- The account is locked or disabled.
- The account registration feature should also be taken into consideration, and the same approach of generic error message can be applied based on the case in which the user exists.
- Using any of the authentication mechanisms (login, password reset or password recovery), an application must respond with a generic error message regardless of whether:
-
Correct response examples:
- Login: "Login failed; Invalid username or password".
- Password recovery: "If that email address is in our database, we will send you an email to reset your password".
- Account creation: "A link to activate your account has been sent to the provided address".
Classifications |
---|
- CWE-203
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References |
---|
Updated over 3 years ago