Skip to content

An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function.

Notifications You must be signed in to change notification settings

njmbb8/CVE-2024-42849

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-42849

An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function.

Writeup

If the password change request is intercepted and a sufficiently long(1MB) string is supplied as the password to use, system resources will be overwhelmed by the attempt to hash the password and cause a DoS.

Proof of Concept(PoC)/Steps to Reproduce

  1. Generate a 1MB long string.

Generate a long string

  1. Intercept request using Burpsuite or similar, send it to Intruder and set the new and confirmation passwords as payload positions.

Sending request to intruder

  1. Load the file generated in step 1 as a payload.

Setting the payload

  1. Once the attack is started, resource usage should skyrocket and the Silverpeas application will become unresponsive.

High resource usage

About

An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published