- Edited
Hello team..!
Im kavinkumar a bug bounty researcher and an student i have found an critical vulnerability in your site
BugIRECT IP ACCESS ALLOWED
I have found the the origin ip using the SHODAN extension
34.111.242.115
And I have also found that https://34.111.242.115/signin serves as an insecure login page
Impact:
Increased Risk of DDoS: Allowing direct IP access can make systems more susceptible to Distributed Denial of Service (DDoS) attacks, where attackers flood the network with traffic, causing it to become overwhelmed and inaccessible.
Lack of Load Balancing: Direct IP access bypasses load balancers, leading to uneven distribution of traffic. This can result in some servers being overwhelmed while others are underutilized.
IP Spoofing: Attackers can use IP spoofing techniques to disguise their IP address and gain access to the system, making it difficult to track and block malicious activities.
<moderator clipped image showing QR code login tag>
Mitigation:
I'll recommend you to use an securable WEB APPLICATION FIREWALL
Use Firewalls and Security Groups
Restrict Access: Implement firewalls and security groups to restrict access to specific IP addresses or ranges. Only allow access from trusted IPs, and block all others.
Network Segmentation: Use network segmentation to isolate critical systems from direct public access. Place sensitive systems behind firewalls, making them accessible only through secure, authenticated channels.
- Implement Load Balancers
Abstract IP Addresses: Use load balancers to manage traffic and abstract the underlying IP addresses from users. This ensures that users do not directly access the server’s IP addresses.
Distribute Traffic: Load balancers can distribute incoming traffic across multiple servers, reducing the risk of overload and improving redundancy. - Use VPNs and Secure Access Channels
VPN Gateways: Require remote users to connect through a Virtual Private Network (VPN) before accessing internal systems. This adds a layer of security by encrypting traffic and authenticating users.
TLS/SSL Encryption: Ensure that all connections use Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to encrypt data in transit, preventing interception by attackers. - Employ Intrusion Detection and Prevention Systems (IDPS)
Monitor Traffic: Deploy Intrusion Detection and Prevention Systems to monitor traffic for suspicious activities. These systems can detect and block attacks like brute force attempts, IP spoofing, and DDoS attacks.
Anomaly Detection: Implement anomaly detection to identify and respond to unusual traffic patterns, such as spikes that could indicate a DDoS attack.