Loading HuntDB...

Password token validation in https://wakatime.com/

Low
W
WakaTime
Submitted None
Reported by silv3rpoision

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
Hi team, I noticed that when requesting multiple reset links at https://wakatime.com/reset_password/ all tokens are valid and can be used. In numerous applications the following policy is adopted as an additional security measure: keep valid only that token with shorter lifetime (last requested) or invalidate all reset links generated after successful use of one of these tokens Please check it. Steps to reproduce: 1.Go to password reset page and request two times for pass reset token 2.Then go to your email and visit first pass reset link 3.Then you will realize that it is not getting expired . Browser/OS: Chroem latest linux Attack scenario: There is not a immediate thereat to this but it is implemented for best practice and for secure design principle.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic