这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@bholagabbar
Copy link
Member

This is the Final Fix for the Leakage of Usernames that was occurring when a user clicked on the 'forgotPassword' link.

https://issues.openmrs.org/browse/LUI-45


In light of recent comments on the ticket, it has come to notice that this is a serious security issue and must be resolved ASAP. If you see the comments, you will notice that this code fixes the issue as per ticket description and quite well in general.


The Issue: Whenever a hacker enters the name of a random user, and the user is valid, his/her secret question is shown. This is a major vulnerability that had to be addressed.

The Fix: The solution is to ask ANY user a secret question. If the user is invalid, a random Fake Secret Question is asked whose answer is always false and will not the user pass, locking him out after 5 tries. This secret question is assigned on the basis of the hashvalue of the entered username.
basically, the hacker will never know if the user exists because a question is asked irrespective of whether a user is present and invalid users are never authenticated and locked out after 5 tries

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The generated password needs to be longer than the value of the required minimum password length, an arbitrary number like 8 should be used as the default value in case the global property is not set otherwise this will fail if the amdin has set the global property to a longer value like 12

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants