Session Fixation in alovoa/alovoa
Valid
Reported on
Jul 19th 2021
✍️ Description
When a logged in user changes his password, the session does not expire after the update.
🕵️♂️ Proof of Concept
// PasswordController.java does not expire or force to logout the user after the update.
@PostMapping(value = "/change", consumes = "application/json")
public void changePassword(@RequestBody PasswordChangeDto dto)
throws AlovoaException {
passwordService.changePassword(dto); //the user changes the password and still active in the platform.
}
Steps to see it clearer:
- Open a new session in a private window.
- Select the option Change password in the original session.
- Now, in both sessions is possible to interact with the website without have previously been logged out. The private session (can be the attacker's) can be used even when the victim has changed his password.
💥 Impact
This vulnerability allows an attacker to keep the compromised account active despite the password was changed by the real owner of the account. Consider a logout for the user after the update and ask him to login again.
Occurrences
We have contacted a member of the
alovoa
team and are waiting to hear back
2 years ago
Ileana Barrionuevo modified the report
2 years ago
to join this conversation