Loading HuntDB...

Password authentication when changing information bypass. Bypass of report #721341

High
K
Khan Academy
Submitted None
Reported by tomorrowisnew_

Vulnerability Details

Technical details and impact analysis

Unverified Password Change
#SUMMARY When reading the disclosed reports of your program, i see this one report #721341 . The reporter reported a lack of password confirmation when linking accounts. A fix was applied, adding password confirmation when linking account to other services. But i found a way to bypass this, The password confirmation is only done in the client side. This is bad because such methods are vulnerable to response manipulation. I will add a video poc #STEPS TO REPRODUCE 1. Open a browser in which a user has previously logged into an account, but hasn't logged out. 2. Open another browser and login using your account 3. Try to link gmail using your account, it will prompt for a password confirmation, enter your password 4. Intercept the response and copy it 5. Go to the victims account and link to gmail again 6. This time enter any password and intercept response 7. Paste the copied response from the attacker account #POC ██████████ ## Impact An attacker can take over an account and lock a user out by resetting the password.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Unverified Password Change