Loading HuntDB...

Possible user session hijack by invalid HTTPS certificate on inside.gratipay.com domain

Low
G
Gratipay
Submitted None
Reported by b3nac

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
Good evening team! This is a theoretical risk but I thought it was still worth reporting since every endpoint and any data flowing through inside.gratipay.com is unencrypted. # POC https://inside.gratipay.com And every sub directory under inside.gratipay.com. # Description Since the certificate is only valid through *.herokuapp.com the domain is sending a warning message about MITM attacks. This warning is valid because all data is not being HTTPS encrypted. The warning is also pretty scary to anyone browsing inside.gratipay.com for information on how to contribute. # Browsers Verified In * Chrome * Firefox # Patch Add a valid certificate on inside.gratipay.com. Stay classy, you guys rock. *Nerd emoji*.

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

Violation of Secure Design Principles