Waketime Payment Gateway Vulnerability

Disclosed: 2023-08-05 17:05:39 By normalguy46 To wakatime
High
Vulnerability Details
Summary: Waketime's payment gateway does not encrypt data in transit, which could allow an attacker to intercept and capture card information. This vulnerability could be exploited by a man-in-the-middle (MITM) attack, in which the attacker would insert themselves between the user and the payment gateway, intercepting the data as it is transmitted. Steps to Reproduce: Visit the Waketime website. Proceed to subscribe and enter your credit card information. Observe that the data is not encrypted in transit. Expected Results: The data should be encrypted in transit, using a secure protocol. Actual Results: The data is not encrypted in transit, and could be intercepted by an attacker. ## Impact A man-in-the-middle attack is a type of cyberattack in which an attacker inserts themselves between two parties, intercepting and modifying the communication between them.
Actions
View on HackerOne
Report Stats
  • Report ID: 2097517
  • State: Closed
  • Substate: spam
  • Upvotes: 1
Share this report