2FA bypass by sending blank code
High
G
Glassdoor
Submitted None
Actions:
Reported by
safehacker_2715
Vulnerability Details
Technical details and impact analysis
**Summary:** █████████. This is a failure in null check of the entered code. In simple terms, the 2FA while logging in can be bypassed by sending a blank code. This could be because of incorrect comparison of entered code with true code. A pre-validation (may be null check) before comparing the codes would fix the issue
Affected URL or select Asset from In-Scope: Glassdoor 2FA
Affected Parameter: code
Vulnerability Type: Improper Authentication
Browsers tested: Browser independent
## Steps To Reproduce:
(Add details for how we can reproduce the issue)
1. Login to Glassdoor and navigate to https://www.glassdoor.com/member/account/securitySettings_input.htm
2. Enable 2FA
3. Logout
4. Login again and notice OTP is asked
5. Now using Burp suite intercept the POST request by sending incorrect code. [Do not forward]
6. Before forwarding the request to server, remove the code and forward
7. Turnoff Intercept and notice that your login request has been fulfilled
## Supporting Material/References (screenshots, logs, videos):
* ███████
## Impact
2FA Protection bypass. Attacker could gain access despite the 2FA protection by victim
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Authentication - Generic