{"id":20493922,"url":"https://github.com/qeeqbox/authentication-bypass","last_synced_at":"2026-03-19T16:04:52.721Z","repository":{"id":104218768,"uuid":"483807628","full_name":"qeeqbox/authentication-bypass","owner":"qeeqbox","description":"A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism","archived":false,"fork":false,"pushed_at":"2025-08-24T19:12:54.000Z","size":2183,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-08-24T23:21:46.684Z","etag":null,"topics":["authentication","bypass","example","infosecsimplified","metadata","qeeqbox","visualization","vulnerability"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"agpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/qeeqbox.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-04-20T20:43:51.000Z","updated_at":"2025-08-24T19:12:58.000Z","dependencies_parsed_at":"2024-01-29T02:36:34.672Z","dependency_job_id":"791bfb85-dc89-42bb-afcb-8d7adbafcae2","html_url":"https://github.com/qeeqbox/authentication-bypass","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/qeeqbox/authentication-bypass","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthentication-bypass","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthentication-bypass/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthentication-bypass/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthentication-bypass/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/qeeqbox","download_url":"https://codeload.github.com/qeeqbox/authentication-bypass/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fauthentication-bypass/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30362693,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-10T21:41:54.280Z","status":"ssl_error","status_checked_at":"2026-03-10T21:40:59.357Z","response_time":106,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["authentication","bypass","example","infosecsimplified","metadata","qeeqbox","visualization","vulnerability"],"created_at":"2024-11-15T17:37:34.436Z","updated_at":"2026-03-11T00:01:55.268Z","avatar_url":"https://github.com/qeeqbox.png","language":null,"readme":"\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authentication-bypass/main/content/authentication-bypass.svg\"\u003e\u003c/p\u003e\n\nA threat actor is able to bypass the access controllers and gain access to the target\n\nClone this current repo recursively\n```sh\ngit clone --recurse-submodules httbypassps://github.com/qeeqbox/authentication-\n```\nRun the webapp using Python\n```sh\npython3 authentication-bypass/vulnerable-web-app/webapp.py\n```\nOpen the webapp in your browser 127.0.0.1:5142\n\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authentication-bypass/main/content/1.png\"\u003e\u003c/p\u003e\nRight-click on the page and open Developer Tools, find the hidden variable named debug in the post form\n\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authentication-bypass/main/content/2.png\"\u003e\u003c/p\u003e\nChange the variable debug from 0 to 1, this hit log in\n\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authentication-bypass/main/content/3.png\"\u003e\u003c/p\u003e\nYou are logged as admin\n\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/authentication-bypass/main/content/4.png\"\u003e\u003c/p\u003e\n\n## Code\nWhen a user logs in using a username and password in POST request to the login route, a hidden variable called debug is checked, if it's 1, the \n```py\nif parsed_url.path == \"/login\" and \"username\" in post_request_data and \"password\" in post_request_data:\n    ret = self.check_creds(post_request_data['username'][0],post_request_data['password'][0])\n    if isinstance(ret, list) and ret[0] == \"valid\":\n        self.send_content(302, self.gen_cookie(ret[1],60*15)+[('Location', URL)], None)\n        self.log_message(\"%s logged in\" % post_request_data['username'][0])\n        return\n    elif isinstance(ret, list) and ret[0] == \"password\":\n        if \"debug\" in post_request_data:\n            if post_request_data[\"debug\"][0] == \"1\":\n                self.send_content(302, self.gen_cookie(ret[1],60*15)+[('Location', URL)], None)\n                self.log_message(\"%s logged in\" % post_request_data['username'][0])\n                return\n        self.send_content(401, [('Content-type', 'text/html')], self.msg_page(f\"Password is wrong\".encode(\"utf-8\"), b\"login\"))\n        return\n    elif isinstance(ret, list) and ret[0] == \"username\" or isinstance(ret, list) and ret[0] == \"error\":\n        self.send_content(401, [('Content-type', 'text/html')], self.msg_page(f\"User {post_request_data['username'][0]} doesn't exist\".encode(\"utf-8\"), b\"login\"))\n        return\n```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fauthentication-bypass","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fqeeqbox%2Fauthentication-bypass","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fauthentication-bypass/lists"}