Weak Basic Authentication Credentials
Summary#
Invicti detected weak credentials.
Impact#
Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
- Access the contents of the password-protected resources.
- Access password-protected administrative mechanisms such as "dashboard", "management console" and "admin panel," potentially progressing to gain full control of the application.
Remediation#
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.