Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug report - Insecure Design of frontend #2

Open
HowAboutACupOfTea opened this issue Jun 18, 2023 · 0 comments
Open

Bug report - Insecure Design of frontend #2

HowAboutACupOfTea opened this issue Jun 18, 2023 · 0 comments

Comments

@HowAboutACupOfTea
Copy link

HowAboutACupOfTea commented Jun 18, 2023

Issue description

It is possible to bypass the log-in mechanism in the frontend of the application by copying the url of any authorized session. This allows for creating a valid session as any user by having access to the mentioned url.

Steps to reproduce the issue

  1. Start the frontend and the backend
  2. Log in with any user
  3. Copy the url of the page which includes the user id
  4. Log out
  5. Open any browser at any time
  6. Navigate to the previously copied url
  7. You are now logged in without entering any credentials

What's the expected result?

Navigating directly to the url should automatically redirect the browser to the log-in page.

What's the actual result?

Navigating directly to the url allows using the dashboard as if a user logged in.

Insecure layer

Frontend

Possible solutions

  • Automatically redirect to log-in page when navigating directly to a url containing an user id.
  • Only allow navigation to the logged-in home page from the log-in page.
@HowAboutACupOfTea HowAboutACupOfTea changed the title Bug report - insecure design of frontend Bug report - Insecure Design of frontend Jun 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant