Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No 2FA template addition #540

Open
wants to merge 5 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how you exploited the vulnerability. This will speed up triage time and result in faster rewards. Please include specific details on where you identified the vulnerability, how you identified it, and what actions you were able to perform as a result.

Attempt to escalate the vulnerability to perform additional actions. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
**Recommendation(s)**

Implement a 2FA feature for all user accounts and ensure that privileged users are required to configure 2FA.
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
The application did not allow users to configure Two Factor Authentication (2FA).

2FA adds an extra layer of security to user accounts by prompting them to enter a uniquely generated one-time password (OTP) after they have successfully inputted their username and password. This increases the complexity of an attacker being able to compromise an account. Consequently, an attacker may take advantage of a lack of 2FA implementation to potentially take over user accounts.

**Business Impact**

This vulnerability can lead to reputational damage and indirect financial loss to the company as customers may view the application as insecure.

**Steps to Reproduce**

1. Navigate to the following URL: {{URL}}
1. Identify the vulnerability by performing {{action}}
1. Observe the misconfiguration

**Proof of Concept (PoC)**

The following screenshot shows the account management options available to a user. As shown, the user is not provided with the option to configure 2FA:
>
> {{screenshot}}
Loading