- Status Closed
-
Assigned To
cbay - Private
Opened by nhlimon - 18.10.2025
Last edited by cbay - 20.10.2025
FS#229 - Bug Bounty Report: Improper Restriction On Password Functionality
Summary:
The application allows users to reuse their existing password when performing a password change or password reset. This undermines the security intent of these features, as users can bypass the enforcement of setting a new, stronger, and unique credential. Allowing password reuse increases the risk of account takeover, brute-force persistence, and failure to comply with security best practices (such as NIST SP 800-63B and OWASP ASVS), which explicitly recommend preventing the reuse of the same password.
Steps to Reproduce:
Log in to the alwaysdata.com application using valid credentials.
Navigate to the Change Password or Password Reset functionality.
Enter the current password in both the "Old Password" and "New Password" fields (or set the reset password to the same as the old one).
Observe that the operation succeeds, and the password remains unchanged.
Impact:
Defeats the purpose of password change/reset: attackers with leaked or compromised credentials can maintain persistence by resetting to the same password.
Increases susceptibility to brute force and credential stuffing, since the password remains weak or already compromised.
Violates industry-standard best practices for credential management (OWASP, NIST).
Reduces the effectiveness of incident response: if credentials are suspected to be exposed, forcing a reset but allowing reuse leaves accounts vulnerable.
Security Best Practices Reference:
NIST SP 800-63B: Recommends preventing password reuse and enforcing that new credentials differ from previously used ones.
OWASP ASVS 2.1.8: Applications should prevent the use of the same value as the current password when changing or resetting credentials.
Recommendation:
Implement a password history check to ensure that newly set passwords are different from the current one.
Enforce a configurable password history (e.g., last 3–5 passwords cannot be reused).
Provide appropriate user feedback when the entered password matches the old one.
Severity: High – This is a critical flaw because it undermines a fundamental security control designed to mitigate account compromise.
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
- Alt + ⇧ Shift + a Add new task
- Alt + ⇧ Shift + m My searches
- Alt + ⇧ Shift + t focus taskid search
Tasklist
- o open selected task
- j move cursor down
- k move cursor up
Task Details
- n Next task
- p Previous task
- Alt + ⇧ Shift + e ↵ Enter Edit this task
- Alt + ⇧ Shift + w watch task
- Alt + ⇧ Shift + y Close Task
Task Editing
- Alt + ⇧ Shift + s save task
Hello,
Reusing the old password is the same as not changing your password, and we never force our clients to change their passwords.
Kind regards,
Cyril