Password authentication when changing information bypass. Bypass of report #721341
High
K
Khan Academy
Submitted None
Actions:
Reported by
tomorrowisnew_
Vulnerability Details
Technical details and impact analysis
#SUMMARY
When reading the disclosed reports of your program, i see this one report #721341 . The reporter reported a lack of password confirmation when linking accounts. A fix was applied, adding password confirmation when linking account to other services. But i found a way to bypass this, The password confirmation is only done in the client side. This is bad because such methods are vulnerable to response manipulation. I will add a video poc
#STEPS TO REPRODUCE
1. Open a browser in which a user has previously logged into an account, but hasn't logged out.
2. Open another browser and login using your account
3. Try to link gmail using your account, it will prompt for a password confirmation, enter your password
4. Intercept the response and copy it
5. Go to the victims account and link to gmail again
6. This time enter any password and intercept response
7. Paste the copied response from the attacker account
#POC
██████████
## Impact
An attacker can take over an account and lock a user out by resetting the password.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Unverified Password Change