Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Arbitrary user impersonation vulnerability #482

Closed
Topsec-bunney opened this issue Dec 8, 2021 · 3 comments
Closed

Arbitrary user impersonation vulnerability #482

Topsec-bunney opened this issue Dec 8, 2021 · 3 comments
Assignees
Labels

Comments

@Topsec-bunney
Copy link

Topsec-bunney commented Dec 8, 2021

In the article comments,We can impersonate any user to comment,You can even impersonate a system administrator
chrome_KydmsyhHuD
chrome_MGW6ahjcFD
chrome_HMpO3sqwgm

@mark0263 mark0263 added the bug label Dec 8, 2021
@mark0263 mark0263 self-assigned this Dec 8, 2021
@mark0263
Copy link
Contributor

mark0263 commented Dec 8, 2021

Thanks for the report. This seems pretty straight forward to fix, there is an existing UniqueName call that will query the user table to determine if a username already exists, if it does, it will add a random 4 digit number to the end of the username. So in your example, Admin would become Admin6823.

Does the community feel this is an appropriate method to prevent the impersonation?

@Topsec-bunney
Copy link
Author

Yes, the method you said can solve this problem

@leegarner
Copy link
Contributor

leegarner commented Dec 8, 2021 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants