app.mixmax.com Information Discloure on cal.mixmax.com and Not Signing out after Removing information grant access from Google
Medium
Vulnerability Details
Hi,
I found that there was Email Disclosed in the source code of the public calendar link.
PoC:
1: Visit https://cal.mixmax.com/wwelatestevents
2: View Page Source
3: Find email at the end of the page.
organizer: {"_id":"596efbabfb652b65a918d96e","services":{"google":{"email":"[email protected]","name":"WWE Latest Events","picture":"https://lh6.googleusercontent.com/-AHk7ZGqHTXM/AAAAAAAAAAI/AAAAAAAAAAA/APJypA3-NXTkdTrQcKP4GyDWf47674JzLw/s96-c/photo.jpg"}}},
ownerPlanName: null,
This type of information will be disclosed and you can see the email there.
Bug No 2:
I also found that you use gmail account for login and noticed that the user didn't sign out after he had removed app access from his google account.
PoC:
1: Login to your account.
2: Move to https://myaccount.google.com/permissions and delete Mixmax from there.
3: Return to mixmax site and you will not be signed out.
Attack Scenario:
If an attacker get's access to the user's google account he will login in mix max and in this time the user will get to know and will start the process the recovering his account. After he had recovered his account he removed Mixmax from Connected apps so that no one would then be able to access his mixmax account but the attacker who is already signed in will not get signed out and can do harmful damage to the user's Mixmax account.
If you need any other information plz be free to ask.
Regards,
Ali Ashber
Actions
View on HackerOneReport Stats
- Report ID: 262262
- State: Closed
- Substate: resolved
- Upvotes: 12