forgot password page is not rate limiting, allowing to extract usernames by brute force

Bug #1422940 reported by Manuel Seelaus
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Canonical SSO provider
Fix Released
High
Natalia Bidart

Bug Description

Dear sirs,

I would like to introduce myself. I do bug inspections for the top websites
globally and I am hoping to get cooperation. I want to report a security
vulnerability. The issue exists in the following domain :

https://login.ubuntu.com

The bug specifically exists in the forgot my password form :
https://login.ubuntu.com/+forgot_password

The attacker can generate a big lists of emails and brute force the forma to
extract most of Ubuntu users emails. I made a successfull scenario with a
generated mail list with more than 2000 http request without any limitation or
any kind of blocking from the server. Please let me know if you need more
information. Thanks.

Best regards,
Eslam Medhat

Related branches

Martin Albisetti (beuno)
Changed in canonical-identity-provider:
status: New → Confirmed
importance: Undecided → High
Martin Albisetti (beuno)
Changed in canonical-identity-provider:
assignee: nobody → Natalia Bidart (nataliabidart)
Changed in canonical-identity-provider:
status: Confirmed → In Progress
Changed in canonical-identity-provider:
status: In Progress → Fix Committed
Changed in canonical-identity-provider:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.