A malicious actor could rotate tokens of a victim, given that he knows the victim's token ID
High
C
Cloudflare Public Bug Bounty
Submitted None
Team Summary
Official summary from Cloudflare Public Bug Bounty
Due to lack of proper authorization checks a malicious actor was able to rotate API token of a different user using the Roll Token API method leading to DoS for the token owner and the applications that use it. Exploitation of this vulnerability required prior knowledge of the victim's token ID (in UUID format). The fix was released by Cloudflare Engineering enforcing proper access controls for this endpoint.
Actions:
Reported by
esx
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic