2factor auth bypass

Поделиться
HTML-код
  • Опубликовано: 10 сен 2022
  • An attacker can perform an Authentication bypass...
    check it before comment this not a bug
    Note: Hi there,
    Thanks for the report. What you are showing is that the authentication cookies are not being expired on logout. This issue is considered out-of-scope as documented in our vulnerability disclosure policy as it is classified as a low severity vulnerability (P4 or P5) according to Bugcrowd’s Vulnerability Rating Taxonomy. As stated in our policy, we do not pay bounties for such issues.
    Best,
  • НаукаНаука

Комментарии • 26

  • @steiner254
    @steiner254 Год назад +26

    That's not a bug. You've copied even the userID.. That's a p5. Unless you demostrate where the application leaks respective user ID's.

    • @ravichander941
      @ravichander941 Год назад +1

      Also the userid is encrypted so we can't even brute force it

    • @steiner254
      @steiner254 Год назад +1

      @@ravichander941 mehn...

    • @naumanbackupstests746
      @naumanbackupstests746 Год назад +8

      He even paste the cookies that never expired

    • @steiner254
      @steiner254 Год назад +1

      @@naumanbackupstests746 😅aiseee

    • @bugbountypoc4096
      @bugbountypoc4096  Год назад +2

      I really agree with all of you and after the report I also thought about it but it was accepted as a p4.
      the company also told me in this same topic.. so, they considered as a session not expire...

  • @hossamshady1383
    @hossamshady1383 8 месяцев назад +2

    the question as triager where did you got the cookies of response , there is set-cookie response that can't be bypass 2fa and if so it would be p4 or p5

    • @bugbountypoc4096
      @bugbountypoc4096  8 месяцев назад

      Bro please check the description box. I have already mentioned

  • @hiddenstar3393
    @hiddenstar3393 Год назад +1

    Was that a 2fa bypass through a response manipulation ?

  • @edavidwaner2187
    @edavidwaner2187 4 месяца назад +1

    intresting ✌✌✌✌

  • @itsm3dud39
    @itsm3dud39 Год назад +1

    on which platform you find this program?

  • @Xpl0itme921
    @Xpl0itme921 Месяц назад

    This is not a bug nor 2fa bypass you just copy the cookies and paste it on the response.

    • @bugbountypoc4096
      @bugbountypoc4096  Месяц назад

      I agree. But session cookie must be expire after log out.

    • @Xpl0itme921
      @Xpl0itme921 Месяц назад

      @@bugbountypoc4096 please change the title it help to understand the poc for all

  • @c09yc47
    @c09yc47 Год назад +4

    This is not a bug bro

    • @bugbountypoc4096
      @bugbountypoc4096  Год назад +1

      2fa bypass using old session. That is also a part of a 2fa bypass. this report was considered as p4.

  • @satishpyata1795
    @satishpyata1795 Год назад +3

    That's not a bug.

    • @bugbountypoc4096
      @bugbountypoc4096  Год назад

      2fa bypass using old session. That is also a part of a 2fa bypass. check it on google

    • @tsumogi
      @tsumogi Год назад +2

      @@bugbountypoc4096 but that means the attacker would already have to have access to the account, making the 2fa bypass useless since the attacker is already in the account

  • @zzzzzzzzZzZZzzzaZzz
    @zzzzzzzzZzZZzzzaZzz Год назад +1

    where the bypass ?

    • @bugbountypoc4096
      @bugbountypoc4096  11 месяцев назад

      2fa bypass using the old cookie. why does this not bypass????

    • @zzzzzzzzZzZZzzzaZzz
      @zzzzzzzzZzZZzzzaZzz 11 месяцев назад +1

      @@bugbountypoc4096 Nice and how you got the old cookie ?