Loading HuntDB...

A malicious actor could rotate tokens of a victim, given that he knows the victim's token ID

High
C
Cloudflare Public Bug Bounty
Submitted None

Team Summary

Official summary from Cloudflare Public Bug Bounty

Due to lack of proper authorization checks a malicious actor was able to rotate API token of a different user using the Roll Token API method leading to DoS for the token owner and the applications that use it. Exploitation of this vulnerability required prior knowledge of the victim's token ID (in UUID format). The fix was released by Cloudflare Engineering enforcing proper access controls for this endpoint.

Reported by esx

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic