Possible User Session Hijack using Invalid HTTPS certificate on inside.gratipay.com domain
Medium
G
Gratipay
Submitted None
Actions:
Reported by
mr_unknown
Vulnerability Details
Technical details and impact analysis
Good evening team!
This is a theoretical risk but I thought it was still worth reporting since every endpoint and any data flowing through inside.gratipay.com is unencrypted.
POC
https://inside.gratipay.com
And every sub directory under inside.gratipay.com.
Description
Since the certificate is only valid through *.herokuapp.com the domain is sending a warning message about MITM attacks. This warning is valid because all data is not being HTTPS encrypted.
The warning is also pretty scary to anyone browsing inside.gratipay.com for information on how to contribute.
Browsers Verified In
Chrome
Firefox
Patch
Add a valid certificate on inside.gratipay.com.
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable
Submitted
Weakness
Violation of Secure Design Principles