Bypassing 2FA with conventional session management - open.rocket.chat

Disclosed: 2024-08-10 19:08:18 By hackeriron1 To rocket_chat
Low
Vulnerability Details
**Summary:** Hii Team, I have found a vulnerability in open.rocket.chat and I able to bypass 2FA by Email confirmation link. In this case, attackers use the email confirmation link because, often, 2FA is not implemented on the system’s login page after a email confirmation. ## Releases Affected: https://open.rocket.chat ## Steps To Reproduce: Attack scenario : 1). Sign up with email. 2). add 2FA. 3). Go to account change email (Email verification will be sent to victim email). 4). Attacker able to login with email verification link without 2FA code. ## Supporting Material/References: same vulnerability was in Instagram but via password reset. https://infosecwriteups.com/how-i-couldve-bypassed-the-2fa-security-of-instagram-once-again-43c05cc9b755 ## Suggested mitigation Do not direct login after email confirmed. ##POC Video ███ I hope you will understand If you need more info, I will provide you. ## Impact Using this method, attackers can bypass the two-factor authentication in open.rocket.chat where the architecture of the site or platform makes it possible.
Actions
View on HackerOne
Report Stats
  • Report ID: 1701378
  • State: Closed
  • Substate: resolved
  • Upvotes: 17
Share this report