Loading HuntDB...

2FA bypass by sending blank code

High
G
Glassdoor
Submitted None
Reported by safehacker_2715

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
**Summary:** █████████. This is a failure in null check of the entered code. In simple terms, the 2FA while logging in can be bypassed by sending a blank code. This could be because of incorrect comparison of entered code with true code. A pre-validation (may be null check) before comparing the codes would fix the issue Affected URL or select Asset from In-Scope: Glassdoor 2FA Affected Parameter: code Vulnerability Type: Improper Authentication Browsers tested: Browser independent ## Steps To Reproduce: (Add details for how we can reproduce the issue) 1. Login to Glassdoor and navigate to https://www.glassdoor.com/member/account/securitySettings_input.htm 2. Enable 2FA 3. Logout 4. Login again and notice OTP is asked 5. Now using Burp suite intercept the POST request by sending incorrect code. [Do not forward] 6. Before forwarding the request to server, remove the code and forward 7. Turnoff Intercept and notice that your login request has been fulfilled ## Supporting Material/References (screenshots, logs, videos): * ███████ ## Impact 2FA Protection bypass. Attacker could gain access despite the 2FA protection by victim

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic