Session Duplication due to Broken Access Control
High
Vulnerability Details
Due to improper validation of user before generating an API-KEY and improper measures taken at the time of password reset, it is possible to generate a parallel session at the attacker's end.
Proof of concept video is attached to confirm the vulnerability and to demonstrate the Impact of this _logical_ bug.
Steps to Reproduce
=============
Attacker
---------
- Create an account with victims email.
- Download the coding platforms and get API-KEY.
- He can code from the platforms using the victims API-key.
Victim
-------
- User fails to create an account, due to email already registered and does a password reset.
- Downloads the coding platform and get API-KEY.
- He codes using API-KEY.
It is possible for the Attacker and Victim, for coding at the same time, which will be shown at the dashboard. Attacker can reduce the difficulty and can damage the reputation of the coder.
Impact
=====
__Attacker can brute-force email and register multiple account on wakatime to get API-Key of many users.__
Improper rank calculation.
Session duplication by the attacker
Actions
View on HackerOneReport Stats
- Report ID: 247225
- State: Closed
- Substate: duplicate
- Upvotes: 3