IDOR when editing users leads to Account Takeover without User Interaction at CrowdSignal
Critical
A
Automattic
Submitted None
Actions:
Reported by
bugra
Vulnerability Details
Technical details and impact analysis
## Summary:
Hi team,
If you click `Edit` button on any user of your team at https://app.crowdsignal.com/users/list-users.php, you will send a GET request to `https://app.crowdsignal.com/users/invite-user.php?id=(userid)&popup=1`
In this endpoint, `id` parameter is vulnerable for IDOR. When you change the user ID, you will see victim's email in response like that :
{F893392}
And if you click `Update Permissions` button, you will log-in to victim's account directly.
Also, user IDs are sequential. And they have a simple range with `00010006` to `19920500+`
## Steps To Reproduce:
1. Log-in to your team account at CrowdSignal
1. Go to https://app.crowdsignal.com/users/invite-user.php?id=19920465&popup=1
1. You will see my email, and if you click `Update Permissions`, you will takeover my account.
1. You can change the user ID to random number with `00010006` - `19920500` range.
## Impact
IDOR leads to account takeover without user interaction
Thanks,
Bugra
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Insecure Direct Object Reference (IDOR)