content spoofing

Disclosed: 2017-05-16 05:41:29 By d0rkerdevil To legalrobot
Unknown
Vulnerability Details
1. go to 'Sign in to Legal Robot Ideas Portal' this link 'https://legalrobot.ideas.aha.io/portal_session/new' 2.and enters invalid login credential , the user will the redirected to this link: 'https://legalrobot.ideas.aha.io/auth/failure?message=invalid_credentials&strategy=password_portal_user&email=<email address>' #note : view 1.png file in the attachment. 3.now remove 'password_portal_user'from the redirected link. #note: view 2.png file in the attachment. 4.now remove 'invalid_credentials' from the redirected link #note:view 3.png file in the attachment. 5.also remove email address showing in the url :'https://legalrobot.ideas.aha.io/auth/failure?message=invalid_credentials&strategy=password_portal_user&email=<email address>' 6.after all the changes ur will look like this: 'https://legalrobot.ideas.aha.io/auth/failure?message=&strategy=r&email=' 7.now type 'you are Hacked!' without quotes and now ur will look like this: 'https://legalrobot.ideas.aha.io/auth/failure?message=you are Hacked!&strategy=r&email=' 8. and you will the error massage content is changed from 'Login failed. If you are an Aha! User log in to Aha! first.' to 'Single sign on failure:you are Hacked!' . #now view 4.png file in the attachment thankyou!
Actions
View on HackerOne
Report Stats
  • Report ID: 167380
  • State: Closed
  • Substate: spam
  • Upvotes: 13
Share this report