You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There is a logic vulnerability in the verification code of the login interface
Is there an existing issue for this?
I have searched the existing issues
Can the issue be reproduced with the default theme (daylight/midnight)?
I was able to reproduce the issue with the default theme
Could the issue be due to extensions?
I've ruled out the possibility that the extension is causing the problem.
Describe the problem
After the front-end enters the correct verification code, the packet is captured and held, and then the current verification code can be used for unlimited replay attacks (the password can be cracked)
Step 1. Capture the packet
Step 2. Use the same verification code to blast password
Step 3. Find the correct password no need verifying the verification code
Expected result
The current verification code lifecycle ends after each login attempt
Screenshot or screen recording presentation
No response
Version environment
- Version: All Versions
- Operating System: All Systems
- Browser (if used): All Browsers
Log file
No need.
More information
No response
The text was updated successfully, but these errors were encountered:
Thanks for the feedback, I have been able to reproduce the issue and will fix it in the next version.
88250
changed the title
There is a logic vulnerability in the verification code of the login interface
Access authorization code vulnerability
Nov 14, 2024
88250
changed the title
Access authorization code vulnerability
Access authorization code captcha vulnerability
Nov 15, 2024
There is a logic vulnerability in the verification code of the login interface
Is there an existing issue for this?
Can the issue be reproduced with the default theme (daylight/midnight)?
Could the issue be due to extensions?
Describe the problem
After the front-end enters the correct verification code, the packet is captured and held, and then the current verification code can be used for unlimited replay attacks (the password can be cracked)
Step 1. Capture the packet
Step 2. Use the same verification code to blast password
Step 3. Find the correct password no need verifying the verification code
Expected result
The current verification code lifecycle ends after each login attempt
Screenshot or screen recording presentation
No response
Version environment
Log file
No need.
More information
No response
The text was updated successfully, but these errors were encountered: