Page MenuHomePhabricator

Add a rate limit for guessing old passwords when changing passwords
ClosedPublic

Authored by epriestley on Jan 22 2018, 1:52 AM.
Tags
None
Referenced Files
F15540743: D18906.id45367.diff
Fri, Apr 25, 8:36 AM
F15466943: D18906.id45322.diff
Thu, Apr 3, 11:03 AM
F15463400: D18906.diff
Tue, Apr 1, 11:05 PM
F15453763: D18906.id45322.diff
Sat, Mar 29, 2:11 PM
F15452706: D18906.id45367.diff
Sat, Mar 29, 6:51 AM
F15450349: D18906.id.diff
Fri, Mar 28, 3:11 PM
F15447287: D18906.diff
Thu, Mar 27, 10:55 PM
F15381877: D18906.diff
Mar 14 2025, 9:44 AM
Subscribers
None

Details

Summary

Depends on D18904. Ref T13043. If an attacker compromises a victim's session and bypasses their MFA, they can try to guess the user's current account password by making repeated requests to change it: if they guess the right "Old Password", they get a different error than if they don't.

I don't think this is really a very serious concern (the attacker already got a session and MFA, if configured, somehow; many installs don't use passwords anyway) but we get occasional reports about it from HackerOne. Technically, it's better policy to rate limit it, and this should reduce the reports we receive.

Test Plan

Tried to change password over and over again, eventually got rated limited. Used bin/auth unlimit to clear the limit, changed password normally without issues.

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable