Arbitrary modification value "session" (Cookie) in badoo.com

Disclosed: 2017-06-25 01:26:40 By ahiezer To bumble
Low
Vulnerability Details
Users who log on through https://m.badoo.com/ receive a session cookie named "session" whose value represents the user identifier. I have found a way to change the value of the cookie, this error can be used to: Leave off the application to a particular user to log on again, the attacker would have to cause the victim to visit a particular link. https://mus1.badoo.com/es/help?platform=4&sessionId=Not_Valid - Tricking a user to perform a certain action (eg buy credits) believe that this action is for your profile when in fact it is a profile of the attacker. Proof of Concept a document is attached to the PoC
Actions
View on HackerOne
Report Stats
  • Report ID: 178567
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report