[REMOTE] Full Account Takeover At https://██████████████/CAS/

Disclosed: 2019-10-04 15:23:30 By karimrahal To deptofdefense
High
Vulnerability Details
**Summary:** A session cookie **PROD_CAS_SESSION** takes a User ID as an input, hence an attacker is able to insert his victim's User ID and takeover his victim's account. (P.S The User ID is only 6 numbers long). ## Impact An attacker is able to insert his victim's User ID into the cookie **PROD_CAS_SESSION** and takeover his victim's account. ## Step-by-step Reproduction Instructions 1. Go to https://██████/MOS/ (This is one of many websites you can do this from) 2. Add a cookie with the domain **███**, the name **PROD_CAS_SESSION*, and the value should be ur victim's User ID (example: **195141**). 3. Refresh the page 4. Done, you will be logged into your victim's account. **To Get User's Info** 4. At https://████/MOS/, you will notice a dropdown on the right top corner with **Welcome (Your Victim's Name)**, click the dropdown and click **My Profile** 5. Done, you will be able to see your victim's user info. ## Suggested Mitigation/Remediation Actions Add a more secure session value.
Actions
View on HackerOne
Report Stats
  • Report ID: 215859
  • State: Closed
  • Substate: resolved
  • Upvotes: 18
Share this report