Impersonation of Wakatime user using Invitation functionality.
W
WakaTime
Submitted None
Actions:
Reported by
asaxena2190
Vulnerability Details
Technical details and impact analysis
Hi wakatime team,
I have found a vulnerability in your leaderboard invitation functionality which can be used to trick the victims on the name of wakatime.
Anyone can sign up with any email id and use the leadersboard invitation to invite anyone. This loophole can be leveraged for impersonation of any user to the victims.
Eg. If bob steave is the name of Alice's boss. Then Attacker can create a wakatime account with his Bob's real id like [email protected] and without confirming his this email address he can send the invitation to Alice. Now there is no doubt Alice will accept the invitation as well as he will perform the all steps provided by that invitation mail. Which can be done by the above vulnerability.
**Description:** Wakatime have a feature in which a user can invite anyone to his leaderboard. There are 3 fields Name , Email Id and role. But the Name field should be restricted to maximum 20 words. But wakatime is allowing 200 characters to this field. Which can be enough to construct a completely different mail.
**Steps to reproduce:**
1. Login into the account.
2. Create a leaderboard.
3. Invite a victim without verifying email address.
4. Invitation email will be successfully sent.(Vulnerability 1)
4. In name field write some social engineering message.
5. Input victim's Email Id
6. Invite him.
7. He will receive the mail which is constructed by attacker with some social engineering method on the name of wakatime.
8. If victim is already a member of wakatime, he can be tricked to steal his information. (Vulnerability 2)
**Browser:** Tried on three browser.
**Fix:**
Limit the name field to max 20 or 25.
Screen shot is attached.
Please check it.
Thanks,
Akash Saxena
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Violation of Secure Design Principles