Loading HuntDB...

Reset password link sent over unsecured http protocol

High
M
Mattermost
Submitted None
Reported by uchihaluckycs

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
## Summary: After creating the workspace, if victim clicks on forgot password then reset password link has been generated and sent over mail and that password link is unsecured http protocol. ## Steps To Reproduce: 1. Signup to a workspace 2. Navigate to https://h1-\*your-own-instance\*.cloud.mattermost.com/reset_password and enter signup email 3. Check email, you will get reset passwork link. {F2201387} 4. Copy that link paste in notepad and observe the protocol. {F2201388} ## Mitigation: Generate reset password link with secured https protocol. ## Impact If the victim opens the reset password link and forgot to update the password, anyone from intermediate computers through network or sniffer can reset the password.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$750.00

Submitted

Weakness

Improper Access Control - Generic