Business logic vulnerabilities when wrong password entered successful on the third attempt?

Business logic vulnerabilities when wrong password entered successful on the third attempt?

I’ve been reading about Business logic vulnerabilities and can’t help but wondering how’s the flaw in the following image possible?

Why does the 3rd attempt successful even when the wrong password provided? Or do I interpreted it wrongly? Can someone help to explain? Or provide simple code for this flaw?

https://portswigger.net/web-security/logic-flaws

https://preview.redd.it/es5blr3uzjaa1.png?width=837&format=png&auto=webp&s=55e8abf2e594162bea21f3593b2ac82d7d7f6322

submitted by /u/w0lfcat
[link] [comments]

January 7, 2023
Read More >>

Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack

The Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack in December that is still impacting medical activity. The Saint Gheorghe Recovery Hospital in Botoşani, in northeastern Romania, was hit by a ransomware attack in December that is still impacting medical operations. The hospital is not able to report the services performed in December […]

The post Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack appeared first on Security Affairs.

January 7, 2023
Read More >>

😎 I can’t be the only one who….

…goes on a website, only to be met with a sign-up page which requires my mail. Does anybody have any tips on how to sign up to those websites without actually using my personal mail adress or taking the time to create a new one? submitted by &…

January 7, 2023
Read More >>

Secret Magpie helps you find accidentally leaked passwords in git repositories

Organisations struggle to scan for leaked secrets in ALL of their repos. It’s easy to scan one repo, but time consuming and tedious to scan all of them.

SecretMagpie is a secret detection tool that hunts out all the secrets hiding in ALL your repositories.

It supports finding repos in Github, Gitlab, Azure DevOps (ADO), Bitbucket and the local file system.

Given an auth token, it will:

enumerate all of the repos clone each repo down scan EVERY branch with multiple tools squash all the findings into one big list deduplicate them so you dont triage the same thing twice give you some great stats and a full report in csv or json

https://github.com/punk-security/secret-magpie-cli

submitted by /u/punksecurity_simon
[link] [comments]

January 6, 2023
Read More >>

Using XSS without user interaction?

The most common use cases for XSS seem to be related to hijacking a users session, but are there any ways an XSS vulnerability can be used without relying on user interaction? I get that the main point of XSS is to run JS in someone else’s browser sess…

January 6, 2023
Read More >>

Microsoft details techniques of Mac ransomware

Microsoft warns of different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) targeting Apple macOS systems. Microsoft Security Threat Intelligence team warns of four different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) that impact Apple macOS systems. The initial vector in attacks involving Mac ransomware typically relies on user-assisted methods, such as downloading and running fake […]

The post Microsoft details techniques of Mac ransomware appeared first on Security Affairs.

January 6, 2023
Read More >>