| Type | software |
| Product Environment | web |
| Product Name | ezBookkeeping |
| Product Vendor | Mayswind |
| Product Version | 0.7.0 |
| Product Link | https://github.com/mayswind/ezbookkeeping |
| Vulnerability Name | Login Bruteforce |
| Severity | Critical |
|
CVSS String
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVSS Score | 9.8 |
| CVE ID | CVE-2024-57603 |
| Vendor Acknowledgement | Yes |
|
Affected digital Assets
|
100 |
|
Affected Users
|
100 |
| Date of Reporting | Dec 27, 2024 |
| PoC Exploit | https://gist.github.com/0xHamy/edbf260d4ab6bb9628148bb376619292 |
| Credit | 0xhamy |
The /api/authorize.json login endpoint is susceptible to credential-stuffing / brute-force attacks against both username and password because there is no effective rate limiting, progressive backoff, account lockout, or bot mitigation (e.g., CAPTCHA) by default. The endpoint returns a deterministic error response for invalid credentials which can be used by an attacker to script password-guessing at scale, increasing the risk of account takeover.
http://10.0.0.94/desktop#/login.POST /api/authorize.json HTTP/1.1
Host: 10.0.0.94
Content-Type: application/json
Origin: http://10.0.0.94/
Referer: http://10.0.0.94/desktop
{"loginName":"man1","password":"1234567890"}
{"errorCode":201002,"errorMessage":"login name or password is wrong","path":"/api/authorize.json","success":false}
Applying a combination of rate-limiting, account lockouts, anti-bot measures, MFA, and improved logging will substantially reduce the risk from automated brute-force and credential-stuffing attacks.