Account takeover due to misconfiguration
Low
M
Mattermost
Submitted None
Actions:
Reported by
akashhamal0x01
Vulnerability Details
Technical details and impact analysis
## Summary:
HI team, i hope you are good :)
Its a very simple logical flaw that results in this
So suppose we are [email protected] , now login into the website then
1. go to account settings and then change mail address to [email protected]
2. a link will be sent to [email protected], now the user realizes that he have lost access to [email protected] due to some reasons
3. so he will probably change mail to the another mail address for e.g [email protected] which he owns and has access to
4. but it is found that even after verifying [email protected], the old link which was sent to [email protected] is active, so user/attacker having access to that mail can verify it and takeover acc
In a nutshell :
It is mandatory for a web app to invalidate the tokens in time to secure its user
In this case, suppose while changing mail address the user mistakenly typed wrong mail address, so the link will be sent to that mail address.
So the user probably don't want the user of that mail address to verify it, so he will quickly change his mail address to one he owns and verify it
what he doesn't know is that even after verification(change of major state), the old link is still active
the flaw :
user changes mail to [email protected] -> user realizes that he mistyped the mail -> so he again changes to mail he owns and verifies it -> old link sent to [email protected] is still active even after new mail has been verified
## Impact
An attacker can takeover acc due to misconfiguration, not invalidation of tokens at major state change, in time
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Use of a Key Past its Expiration Date