RE: RE: Compromised Passwords Could be Used

Václav Suchánek, modified 1 Year ago. Junior Member Posts: 26 Join Date: 8/15/18 Recent Posts

The application does not check passwords against a set of breached passwords that match the system’s password policy.

If an application fails to validate passwords against a set of breached passwords aligned with the system's password policy, it poses potential impacts:

• Credential Stuffing Attacks: Attackers can leverage breached password databases to launch credential stuffing attacks, trying known compromised passwords across various accounts, leading to unauthorized access.

• Data Breach Risk: Failure to identify breached passwords increases the likelihood of successful brute-force attacks, potentially resulting in a data breach with sensitive user information exposed.

Remediation

The application should block common and compromised passwords. For this purpose, it can use the Pwned Passwords service. It can host it or use its API:

• https://haveibeenpwned.com/Passwords

• https://haveibeenpwned.com/API/v3#PwnedPasswords

See ASVS v4.0.3, section 2.1.7:
Verify that passwords submitted during account registration, login, and password change are checked against a set of breached passwords either locally (such as the top 1,000 or 10,000 most common passwords which match the system's password policy) or using an external API. If using an API a zero knowledge proof or other mechanism should be used to ensure that the plain text password is not sent or used in verifying the breach status of the password. If the password is breached, the application must require the user to set a new non-breached password.

thumbnail
Václav Suchánek, modified 1 Year ago. Liferay Master Posts: 764 Join Date: 1/5/10 Recent Posts

Hi Václav,

The https://liferay.atlassian.net/browse/LPS-121598 feature request covers this one also.

Regards,
Zsigmond

Václav Suchánek, modified 1 Year ago. Junior Member Posts: 26 Join Date: 8/15/18 Recent Posts

Thank you, Zsigmond.