Broken Authentication and Session Management (Identification and Authentication Failures)
Broken Authentication and Session Management (Identification and Authentication Failures)
Summary : Weak session management and authentication mechanisms, allowing you to manipulate session
tokens or credentials to impersonate other users.
OWASP Category: M1: Improper Platform Usage ,M3: Insecure Communication,M7: Client Code Quality,IDOR
Severity : High
Steps to Reproduce:
Connect your iOS device to the same network as your laptop and configure the iOS device to use the Burp
Suite proxy.
In the Repeater, change the userPhoneOrEmail parameter to a different phone number or email.
Note that you can now access the account associated with the modified phone number or email, which is a
severe flaw in the system. (blurred to sustain privacy).
This unauthorized access is reflected both in Burp Suite and on the iOS device.
By following these steps, you can reproduce the vulnerability, demonstrating how the app fails to properly
validate and secure user information, allowing unauthorized access to any user's account.
Impact : This vulnerability allows an attacker to access any user's account by tampering with the phone
number or email parameter in network requests. As a result, sensitive personal information can be exposed,
and unauthorized actions can be performed on behalf of other users. This represents a severe security flaw,
compromising user privacy and system integrity.
https://hackerone.com/reports/42587
https://hackerone.com/reports/204292
https://hackerone.com/reports/751577
Some more issues to mention :
Binary make use of insecure API(s) - CWE-676 | OWASP MASVS - MSTG CODE-8 | : The Binary may contain the
following insecure API(s) fopen , sscaf.
Binary make use of malloc function - CWE-789 Uncontrolled memory Allocation| OWASP MASVS - MSTG CODE-
8 | : The Binary may use _maloc function instead of calloc.