Skip to content

Froxlor username/surname AND company field Bypass

Moderate
d00p published GHSA-625g-fm5w-w7w4 Jan 3, 2024

Package

No package listed

Affected versions

2.1.1

Patched versions

2.1.2

Description

Dear Sirs and Madams,

I would like to report a business logic error vulnerability that I discovered during my recent penetration test on Froxlor.

Specifically, I identified an issue where it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements established by the system.

The surname, family name AND company name all of them can be left blank.

I believe addressing this vulnerability is crucial to ensure the security and integrity of the Froxlor platform.

Thank you for your attention to this matter.

This action served as a means to bypass the mandatory field requirements.

Lets see (please have a look at the Video -> attachment).


as you can see i was able to let the username and second name blank.

Froxlor.username.and.password.field.Bypass.mp4

Lets see again.

Only the company name is set.

Thank you for your time

Froxlor 2
Froxlor 1

Severity

Moderate

CVE ID

CVE-2023-50256

Weaknesses

Credits