Loading HuntDB...

Bypassing 2FA with conventional session management - open.rocket.chat

Low
R
Rocket.Chat
Submitted None
Reported by hackeriron1

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
**Summary:** Hii Team, I have found a vulnerability in open.rocket.chat and I able to bypass 2FA by Email confirmation link. In this case, attackers use the email confirmation link because, often, 2FA is not implemented on the system’s login page after a email confirmation. ## Releases Affected: https://open.rocket.chat ## Steps To Reproduce: Attack scenario : 1). Sign up with email. 2). add 2FA. 3). Go to account change email (Email verification will be sent to victim email). 4). Attacker able to login with email verification link without 2FA code. ## Supporting Material/References: same vulnerability was in Instagram but via password reset. https://infosecwriteups.com/how-i-couldve-bypassed-the-2fa-security-of-instagram-once-again-43c05cc9b755 ## Suggested mitigation Do not direct login after email confirmed. ##POC Video ███ I hope you will understand If you need more info, I will provide you. ## Impact Using this method, attackers can bypass the two-factor authentication in open.rocket.chat where the architecture of the site or platform makes it possible.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic