-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathAuthentication Bypass
31 lines (18 loc) · 945 Bytes
/
Authentication Bypass
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Authentication Bypass
Summary :Authentication Bypass is a dangerous vulnerability which is found in Web-Applications. Attackers can bypass the control mechanisms which are used by the underlying web application like OTP, Captcha, 2FA, Email verification etc.
An Attacker can perform a complete Account takeover of Victim.
Severity : High
Complexity : Easy
From : Remote / External
Steps to Reproduce:
Proof of Concept : Attached in the Video
Impact : An Adversary can carry out Auth Bypass attack and perform an Account Take Over
Affected IP's : IP Address Port
https://www.example.com/ 443
Recommendations :
The application should protect the sensitive actions and validate the verification process of the web application. Restrict the user for any malicious behaviour.
References :
https://hackerone.com/reports/770504
https://hackerone.com/reports/257305
https://hackerone.com/reports/219205
Proof of Concept :