I signed up using any unclaimed email on application_2 (e.g., firstname.lastname@example.org) due to no email verification, then logged into the victim's account on application_1 using the SSO feature that allowed me to log in using application_2.
In this report, I am going to detail a notable vulnerability I discovered on [Redacted Company]'s platforms. This vulnerability, stemming from an OAuth misconfiguration, allowed an attacker to access an admin panel by exploiting a single sign-on system. This insight underscores the significance of meticulous security configurations and the potential dangers that even slight missteps can harbor.
While evaluating several of [Redacted Company]'s products:
I noted an unusual occurrence during the login process. There were around 8 to 9 sign-in options provided. However, only the
vulnerable.com option allowed users to create a new account, and that option belongs to the same company.
With curiosity, I forged ahead and created an admin account for me on
vulnerable.com. Subsequent to this, I added another user to my organization using an email affiliated with a [Redacted Company] admin which was as simple as
email@example.com I set a password for it.
The crux of the issue here was that
vulnerable.com didn’t demand email verification. Given that [Redacted Company] authenticated based solely on the email address, I exploited this loophole to sign into the admin panel of their product, utilizing the
vulnerable.com login option.
An individual armed with the right information could:
Full compromise of every product and every admin panel the company has.
By taking over admin accounts, I was able to takeover any customer/user accounts as well and leak all their data.
The ramifications are broad, impacting numerous services under [Redacted Company]'s umbrella.
Discovering this vulnerability in a renowned platform was quite an eye-opener. It's a testament to the intricate nature of digital security and serves as a reminder that overlooking even the smallest details can lead to significant security lapses.
If I had rushed to only take note of the multiple login options without delving deeper into the single registration option, I might have missed out on the magnitude of the vulnerability. Thus, like the subdomain takeover I mentioned in my last blog, further probing often reveals more severe impact points.
2023-08-14: Delved deeper into the admin panels.
2023-08-15: Discovered an active ex-admin employee account which helped the company to terminate as well.
Final Word: Continuous probing, persistence, and a keen eye for details are essential in the world of cybersecurity. Ensure you're always a step ahead. Happy hacking!