Brute Force
Username Enumeration Using Brute Force
Overview of the Vulnerability
The ability to bruteforce usernames in a web service can allow an attacker to gain an insight into the user base of a service, helping them identify accounts and test for password reuse, endangering the users accounts for the service. A malicious attacker can leverage user enumeration to generate a potential list of usernames for use in phishing or brute force campaigns.
Business Impact
Username enumeration can result in reputational damage for the business through the impact to customers’ trust in the application’s security of user accounts. If an attacker is able to chain this vulnerability with another it can lead to user account compromise and data exfiltration.
Steps to Reproduce
Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
Use a browser to navigate to: {{URL}}
Fill in the form and send the request
Intercept request in the HTTP interception proxy
Using {{command}} send multiple requests by {{action}}
Proof of Concept (PoC)
The screenshot(s) below demonstrates the response from the server:
{{screenshot}}
Recommendation(s)
The server should respond to valid and invalid authentication attempts with the same message. For example, Login failed. Username or Password invalid.
The server should also take the same amount of time to respond to a valid or invalid request so that an attacker can not use this to distinguish between the two.
Last updated