content spoofing
Unknown
Vulnerability Details
1. go to 'Sign in to Legal Robot Ideas Portal' this link 'https://legalrobot.ideas.aha.io/portal_session/new'
2.and enters invalid login credential , the user will the redirected to this link: 'https://legalrobot.ideas.aha.io/auth/failure?message=invalid_credentials&strategy=password_portal_user&email=<email address>'
#note : view 1.png file in the attachment.
3.now remove 'password_portal_user'from the redirected link.
#note: view 2.png file in the attachment.
4.now remove 'invalid_credentials' from the redirected link
#note:view 3.png file in the attachment.
5.also remove email address showing in the url :'https://legalrobot.ideas.aha.io/auth/failure?message=invalid_credentials&strategy=password_portal_user&email=<email address>'
6.after all the changes ur will look like this: 'https://legalrobot.ideas.aha.io/auth/failure?message=&strategy=r&email='
7.now type 'you are Hacked!' without quotes and now ur will look like this:
'https://legalrobot.ideas.aha.io/auth/failure?message=you are Hacked!&strategy=r&email='
8. and you will the error massage content is changed from 'Login failed. If you are an Aha! User log in to Aha! first.' to 'Single sign on failure:you are Hacked!' .
#now view 4.png file in the attachment
thankyou!
Actions
View on HackerOneReport Stats
- Report ID: 167380
- State: Closed
- Substate: spam
- Upvotes: 13