Loading HuntDB...

Client side authentication leads to Auth Bypass

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by kalkii

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
Hi Team I have found that to access the data of endpoint ```https://████████/███/?#/``` as user has to submit a password/passphrase. When we provide wrong password then we get and error message asked to get pass assistance message ```Contact ████ for password assistance.``` After analyzing the JS file I found that when correct password is provide a parameter is set in the localstorage "███████:true" ## Impact Auth bypass lead to sensitive data exposer like phone number, email id etc. ## System Host(s) ██████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce 1. Visit https://███/█████/?#/ 2. Set a new parameter in local storage name ```█████``` and value ```true``` 3. Reload the page █████ ## Suggested Mitigation/Remediation Actions

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic