Swiftbuy V 1.0 | /login.php - No Limit To Authentication Attempts To Admin Login

Hi all,


I am Maloy Roy Orko.


Recently,in one of my pentest research,I found a web application project and it was SwiftBuy — a modern PHP + MySQL e-commerce website featuring user and admin dashboards, product management, cart system, checkout, and real-time sales analytics. Built with HTML, CSS, JavaScript, Tailwind CSS, and Chart.js. by MD Tasin Rahman (Software Engineer)

So,I downloaded this and started to find vulnerabilities if it has.

CVE Number: In Review

After fiddling with the source code, I found that the admin/login.php file is vulnerable to CWE-307: Improper Restriction of Excessive Authentication Attempts.

It can lead into:

  • - Unauthorized Data Access
  • - Account Takeover
  • - Privilege Escalation
  • - Denial of Service (DoS)
  • - Reputation Damage
  • - Regulatory Consequences

The Main Thing Is,If any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.

Thats why, I am trying to inform everyone about this.

Title of the Vulnerability: 

Swiftbuy V 1.0 | /login.php - No Limit To Authentication Attempts To Admin Login

Vulnerability Class: CWE-307: Improper Restriction of Excessive Authentication Attempts

Product Name: Swiftbuy V 1.0

Vendor: https://github.com/Tasin1025

Vulnerable Product Link:

https://github.com/Tasin1025/swift-buy-full-ecommerce-php


Technical Details & Description: 

The application source code is coded in a way which allows : CWE-307: Improper Restriction of Excessive Authentication Attempts.

Product & Service Introduction: 

Swiftbuy 1.0

Observation & Exploitation: 

Here,The Vulnerable File Is: /login.php


Who will be affected of this attack?

->The Business Owner ! Because Hackers will be able to access and modify user accounts and see even modify their orders and their verification informations and change the destination of ordered items and even delete any running order users and this will lead to a Market Crash.


Lets Exploit 🌠🗝️🔐:


First,Go To /login.php 

You can try for some random passwords for a user email!

You will see that there are no limits even you input 2000 wrong passwords!

But no need to try this ammount of passwords mannually!

Just use my coded tool for this job!

Exploit Link: 

https://github.com/Maloyroyorko/Swiftbuy-Login-Exploiter/

There is a user email in the database:

wolf@gmail.com

We are gonna testing on this email !

So,At first go to the tool link I provided and install into your server and change the email where you wanna test!

My Test Subject Is: wolf@gmail.com

Just read the comments I wrote in my Tool code and follow them and The tool will be ready

Ok,Lets Get The Password?

So,The password is: wolf

Lets login?

Thus,it works and vulnerability has been found!

Prevention Strategies:

  • Limit the login attempts
  • Captcha Verification Implementation

Conclusion :- 

The main aim of this article is to show that if any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too. But I also hope that it helps to give you ideas of how combining attacks can make them much more potent. 


Maloy Roy Orko

I am Maloy Roy Orko. An aspiring security researcher. Learning New Fields and Strategies Since 2019. 💻

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post