Session Duplication due to Broken Access Control
High
W
WakaTime
Submitted None
Actions:
Reported by
anurag98
Vulnerability Details
Technical details and impact analysis
Due to improper validation of user before generating an API-KEY and improper measures taken at the time of password reset, it is possible to generate a parallel session at the attacker's end.
Proof of concept video is attached to confirm the vulnerability and to demonstrate the Impact of this _logical_ bug.
Steps to Reproduce
=============
Attacker
---------
- Create an account with victims email.
- Download the coding platforms and get API-KEY.
- He can code from the platforms using the victims API-key.
Victim
-------
- User fails to create an account, due to email already registered and does a password reset.
- Downloads the coding platform and get API-KEY.
- He codes using API-KEY.
It is possible for the Attacker and Victim, for coding at the same time, which will be shown at the dashboard. Attacker can reduce the difficulty and can damage the reputation of the coder.
Impact
=====
__Attacker can brute-force email and register multiple account on wakatime to get API-Key of many users.__
Improper rank calculation.
Session duplication by the attacker
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Improper Access Control - Generic