Loading HuntDB...

IDOR when editing users leads to Account Takeover without User Interaction at CrowdSignal

Critical
A
Automattic
Submitted None
Reported by bugra

Vulnerability Details

Technical details and impact analysis

Insecure Direct Object Reference (IDOR)
## Summary: Hi team, If you click `Edit` button on any user of your team at https://app.crowdsignal.com/users/list-users.php, you will send a GET request to `https://app.crowdsignal.com/users/invite-user.php?id=(userid)&popup=1` In this endpoint, `id` parameter is vulnerable for IDOR. When you change the user ID, you will see victim's email in response like that : {F893392} And if you click `Update Permissions` button, you will log-in to victim's account directly. Also, user IDs are sequential. And they have a simple range with `00010006` to `19920500+` ## Steps To Reproduce: 1. Log-in to your team account at CrowdSignal 1. Go to https://app.crowdsignal.com/users/invite-user.php?id=19920465&popup=1 1. You will see my email, and if you click `Update Permissions`, you will takeover my account. 1. You can change the user ID to random number with `00010006` - `19920500` range. ## Impact IDOR leads to account takeover without user interaction Thanks, Bugra

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insecure Direct Object Reference (IDOR)