<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>Compromised Passwords Could be Used</title>
  <link rel="self" href="https://liferay.dev/c/message_boards/find_thread?p_l_id=119785294&amp;threadId=122336686" />
  <subtitle>Compromised Passwords Could be Used</subtitle>
  <id>https://liferay.dev/c/message_boards/find_thread?p_l_id=119785294&amp;threadId=122336686</id>
  <updated>2026-04-04T12:14:26Z</updated>
  <dc:date>2026-04-04T12:14:26Z</dc:date>
  <entry>
    <title>RE: RE: Compromised Passwords Could be Used</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122346064" />
    <author>
      <name>Václav Suchánek</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122346064</id>
    <updated>2024-01-18T10:34:48Z</updated>
    <published>2024-01-18T10:34:47Z</published>
    <summary type="html">&lt;p&gt;Thank you, Zsigmond.&lt;/p&gt;</summary>
    <dc:creator>Václav Suchánek</dc:creator>
    <dc:date>2024-01-18T10:34:47Z</dc:date>
  </entry>
  <entry>
    <title>RE: Compromised Passwords Could be Used</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122341563" />
    <author>
      <name>Zsigmond Rab</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122341563</id>
    <updated>2024-01-18T10:34:40Z</updated>
    <published>2024-01-16T08:27:48Z</published>
    <summary type="html">&lt;p&gt;Hi Václav,&lt;/p&gt;
&lt;p&gt;The &lt;a
  href="https://liferay.atlassian.net/browse/LPS-121598"&gt;https://liferay.atlassian.net/browse/LPS-121598&lt;/a&gt;
  feature request covers this one also.&lt;/p&gt;
&lt;p&gt;Regards,&lt;br&gt; Zsigmond&lt;/p&gt;</summary>
    <dc:creator>Zsigmond Rab</dc:creator>
    <dc:date>2024-01-16T08:27:48Z</dc:date>
  </entry>
  <entry>
    <title>Compromised Passwords Could be Used</title>
    <link rel="alternate" href="https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122336685" />
    <author>
      <name>Václav Suchánek</name>
    </author>
    <id>https://liferay.dev/c/message_boards/find_message?p_l_id=119785294&amp;messageId=122336685</id>
    <updated>2024-01-12T08:45:42Z</updated>
    <published>2024-01-12T08:43:45Z</published>
    <summary type="html">&lt;p&gt;The application does not check passwords against a set of breached
  passwords that match the system’s password policy.&lt;/p&gt;
&lt;p&gt;If an application fails to validate passwords against a set of
  breached passwords aligned with the system's password policy, it poses
  potential impacts:&lt;/p&gt;
&lt;p&gt;• Credential Stuffing Attacks: Attackers can leverage breached
  password databases to launch credential stuffing attacks, trying known
  compromised passwords across various accounts, leading to unauthorized access.&lt;/p&gt;
&lt;p&gt;• Data Breach Risk: Failure to identify breached passwords increases
  the likelihood of successful brute-force attacks, potentially
  resulting in a data breach with sensitive user information exposed.&lt;/p&gt;
&lt;p&gt;Remediation&lt;/p&gt;
&lt;p&gt;The application should block common and compromised passwords. For
  this purpose, it can use the Pwned Passwords service. It can host it
  or use its API:&lt;/p&gt;
&lt;p&gt;• &lt;a href="https://haveibeenpwned.com/Passwords"
    rel="noopener noreferrer" target="_blank"&gt;https://haveibeenpwned.com/Passwords&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;• &lt;a href="https://haveibeenpwned.com/API/v3#PwnedPasswords"
    rel="noopener noreferrer" target="_blank"&gt;https://haveibeenpwned.com/API/v3#PwnedPasswords&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;See ASVS v4.0.3, section 2.1.7:&lt;br&gt; Verify that passwords submitted
  during account registration, login, and password change are checked
  against a set of breached passwords either locally (such as the top
  1,000 or 10,000 most common passwords which match the system's
  password policy) or using an external API. If using an API a zero
  knowledge proof or other mechanism should be used to ensure that the
  plain text password is not sent or used in verifying the breach status
  of the password. If the password is breached, the application must
  require the user to set a new non-breached password.&lt;/p&gt;</summary>
    <dc:creator>Václav Suchánek</dc:creator>
    <dc:date>2024-01-12T08:43:45Z</dc:date>
  </entry>
</feed>
