Loading HuntDB...

Token leak in security challenge flow allows retrieving victim's PayPal email and plain text password

High
P
PayPal
Submitted None

Team Summary

Official summary from PayPal

A bug was identified whereby sensitive, unique tokens were being leaked in a JS file used by the recaptcha implementation. In certain cases, a user must solve a CAPTCHA challenge after authenticating. When the security challenge is completed, the authentication request is replayed to log in. The exposed tokens were used in the POST request to solve the CAPTCHA. The researcher identified a method by which a user, starting from a malicious site, could expose the security challenge token to a third party via a cross-site script inclusion (XSSI) attack. If the user then followed a login link from the malicious site and entered their credentials, the malicious third party could complete the security challenge, triggering the authentication request replay and exposing the user's password. This exposure only occurred if a user followed a login link from a malicious site, similar to a phishing page. PayPal implemented additional controls on the security challenge request to prevent token reuse, which resolved the issue, and no evidence of abuse was found.

Reported by alexbirsan

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$15300.00

Submitted

Weakness

Missing Authentication for Critical Function