Loading HuntDB...

Account takeover due to misconfiguration

Low
M
Mattermost
Submitted None
Reported by akashhamal0x01

Vulnerability Details

Technical details and impact analysis

Use of a Key Past its Expiration Date
## Summary: HI team, i hope you are good :) Its a very simple logical flaw that results in this So suppose we are [email protected] , now login into the website then 1. go to account settings and then change mail address to [email protected] 2. a link will be sent to [email protected], now the user realizes that he have lost access to [email protected] due to some reasons 3. so he will probably change mail to the another mail address for e.g [email protected] which he owns and has access to 4. but it is found that even after verifying [email protected], the old link which was sent to [email protected] is active, so user/attacker having access to that mail can verify it and takeover acc In a nutshell : It is mandatory for a web app to invalidate the tokens in time to secure its user In this case, suppose while changing mail address the user mistakenly typed wrong mail address, so the link will be sent to that mail address. So the user probably don't want the user of that mail address to verify it, so he will quickly change his mail address to one he owns and verify it what he doesn't know is that even after verification(change of major state), the old link is still active the flaw : user changes mail to [email protected] -> user realizes that he mistyped the mail -> so he again changes to mail he owns and verifies it -> old link sent to [email protected] is still active even after new mail has been verified ## Impact An attacker can takeover acc due to misconfiguration, not invalidation of tokens at major state change, in time

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Use of a Key Past its Expiration Date