Password token validation in https://wakatime.com/
Low
W
WakaTime
Submitted None
Actions:
Reported by
silv3rpoision
Vulnerability Details
Technical details and impact analysis
Hi team,
I noticed that when requesting multiple reset links at https://wakatime.com/reset_password/ all tokens are valid and can be used.
In numerous applications the following policy is adopted as an additional security measure:
keep valid only that token with shorter lifetime (last requested)
or
invalidate all reset links generated after successful use of one of these tokens
Please check it.
Steps to reproduce:
1.Go to password reset page and request two times for pass reset token
2.Then go to your email and visit first pass reset link
3.Then you will realize that it is not getting expired .
Browser/OS:
Chroem latest linux
Attack scenario:
There is not a immediate thereat to this but it is implemented for best practice and for secure design principle.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Authentication - Generic