Lack of data validation - Path Traversal In github.com/gtsteffaniak/filebrowser/backend
Description
FileBrowser Quantum has Username Enumeration via Authentication Timing Side-Channel
Summary
The /api/auth/login authentication endpoint does not execute in constant time. When a non-existent username is supplied, the server returns a 401/403 response almost immediately. When a valid username is provided, the server performs a bcrypt password comparison, causing a measurable delay in the response time.
Details
The vulnerability exists in the Auth function of JSONAuth in auth/json.go (lines 45–52). The function performs a database lookup for the user prior to performing any password validation.
user, err := userStore.Get(username) if err != nil { return nil, fmt.Errorf("unable to get user from store: %v", err) } err = users.CheckPwd(password, user.Password) if err != nil { return nil, err }...
If the username is not found, the function returns an error immediately. If the username is found, the function calls CheckPwd, which executes the bcrypt hash comparison. Because bcrypt is intentionally computationally expensive, this introduces a measurable delay in the response time.
As a result, an attacker can distinguish valid usernames from invalid ones by measuring the authentication response times.
In testing, responses for valid usernames consistently required approximately 40–50 ms due to the bcrypt comparison, while invalid usernames returned in approximately 1–4 ms.
PoC
The script below automates this attack by calibrating the network latency using non-existent usernames to establish a baseline and then testing a list of target users. Valid usernames are detected when the response time exceeds the baseline.
import requests import time import statistics # Configuration - adjust domain and wordlist as appropriate TARGET_URL = "http://localhost/api/auth/login" WORDLIST = ["admin", "root", "user2", "nonexistent_test_user"] ...
Example output (with admin and user2 configured as valid users in the application):
$ python timeattack.py [*] Calibrating... [*] Baseline: 0.0041s | Threshold: 0.0256s admin | 0.0505s | VALID root | 0.0019s | invalid user2 | 0.0464s | VALID nonexistent_test_user | 0.0015s | invalid
Impact
An unauthenticated attacker can enumerate valid usernames by measuring authentication response times.
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
go | github.com/gtsteffaniak/filebrowser/backend | 0.0.0-20260317230626-af08800667b8 |
Aliases