Loading HuntDB...

Admin.MyTVA.com Customer lookup and internal notes bypass

Medium
T
Tennessee Valley Authority
Submitted None
Reported by itssixtynein

Vulnerability Details

Technical details and impact analysis

Authentication Bypass Using an Alternate Path or Channel
## Summary: The admin.mytva.com site does not properly secure the admin only endpoints, which can allow an attacker to bypass the login and take actions like looking up customers. The endpoints can be enumerated through the forgot password function. ## Steps To Reproduce: 1. Navigate to https://admin.mytva.com/Account/ForgotPassword.aspx and enter 'admin' as the ID 2. Wait on the admin email to appear (this should also be restricted) 3. Attempt to send the reset password and capture the request with BURP 4. Review the response to the request for new endpoints. Some of them that will stand out are: /Evaluation/EditNotes.aspx?ProjectId= /Evaluation/HOEvalDetailWONav.aspx?ProjectID= /Tools/Customer/AddressLookup.aspx 5. The endpoints do not protect themselves for bruteforcing either, so the attacker can now attempt to retrieve further information or add internal/customer notes ## Supporting Material/References: [list any additional material (e.g. screenshots, logs, etc.)] * [attachment / reference] ## Impact Unprotected endpoints may lead to a data breach. It would be recommended to check the logs for previous attacks

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Authentication Bypass Using an Alternate Path or Channel