2FA bypass by sending blank code

Disclosed: 2020-07-02 13:40:30 By safehacker_2715 To glassdoor
High
Vulnerability Details
**Summary:** █████████. This is a failure in null check of the entered code. In simple terms, the 2FA while logging in can be bypassed by sending a blank code. This could be because of incorrect comparison of entered code with true code. A pre-validation (may be null check) before comparing the codes would fix the issue Affected URL or select Asset from In-Scope: Glassdoor 2FA Affected Parameter: code Vulnerability Type: Improper Authentication Browsers tested: Browser independent ## Steps To Reproduce: (Add details for how we can reproduce the issue) 1. Login to Glassdoor and navigate to https://www.glassdoor.com/member/account/securitySettings_input.htm 2. Enable 2FA 3. Logout 4. Login again and notice OTP is asked 5. Now using Burp suite intercept the POST request by sending incorrect code. [Do not forward] 6. Before forwarding the request to server, remove the code and forward 7. Turnoff Intercept and notice that your login request has been fulfilled ## Supporting Material/References (screenshots, logs, videos): * ███████ ## Impact 2FA Protection bypass. Attacker could gain access despite the 2FA protection by victim
Actions
View on HackerOne
Report Stats
  • Report ID: 897385
  • State: Closed
  • Substate: resolved
  • Upvotes: 282
Share this report