This report documents a Weak Password Authentication vulnerability identified during security testing of DVWA.
Testing Type: Manual Penetration Testing
Environment: Local Lab
Security Level Tested: Low
- Vulnerability Name: Weak Password Authentication
- Category: OWASP Top 10 – Identification and Authentication Failures
- Severity: High
- Exploitable: Yes
The application allows users to authenticate using very weak passwords without enforcing any password complexity requirements.
There is no minimum length, no character complexity requirement, and no validation against common or weak passwords.
This significantly increases the risk of unauthorized access.
If deployed in a real-world production environment, this vulnerability could lead to:
- Unauthorized access to user accounts
- Increased risk of brute-force attacks
- Credential stuffing attacks
- Compromise of sensitive application data
- Privilege escalation if admin credentials are weak
This demonstrates the absence of basic authentication security controls.
- Open DVWA in browser.
- Login using default credentials:
- Username: admin
- Password: password
- Navigate to "DVWA Security".
- Set Security Level to Low.
- Logout from the application.
- Attempt login using weak credentials:
- Username: admin
- Password: 12345
- Login is successful.
The application successfully authenticates using a weak and commonly used password.
- No password complexity enforcement
- No minimum password length requirement
- No password strength validation
- No monitoring for weak credentials
Severity Level: High
Reason: Weak passwords significantly increase the probability of successful brute force and credential-based attacks.
To mitigate this vulnerability:
- Enforce strong password policies
- Require minimum length (at least 8–12 characters)
- Enforce complexity (uppercase, lowercase, numbers, special characters)
- Implement account lockout after multiple failed attempts
- Enable Multi-Factor Authentication (MFA)
- Educate users on secure password practices
The authentication mechanism lacks fundamental security controls related to password strength enforcement.
Proper implementation of password policies and monitoring mechanisms is critical to prevent unauthorized access.
End of Report
