Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security][Critical Risk] WAPT-C-1: Default Admin Account Can Reappear #1 #90

Open
tostart-pickagreatname opened this issue Jun 19, 2020 · 2 comments
Labels
security Pull requests that address a security vulnerability

Comments

@tostart-pickagreatname
Copy link
Contributor

Vulnerability Summary
Testers discovered a scenario in which the default admin account can reappear even after being deleted--this is especially dangerous since the default admin account has a static and well-known password.

Analysis of the Attack
The tester followed these steps to produce this issue:
o Set up the environment via the docker process
o Authenticate to the Portal
o Create a new Admin
o Log out of the default admin and log into the new Admin account o Delete the default admin account
o Log out of the application
o Log into the app with the default admin account -- note that the user id is incremented for
that account
Note: It appears as though changing the default admin password before deletion prevents this, but this is not a valid fix.

@tostart-pickagreatname tostart-pickagreatname added the security Pull requests that address a security vulnerability label Jun 19, 2020
@tostart-pickagreatname tostart-pickagreatname changed the title [Security] WAPT-C-1: Default Admin Account Can Reappear #1 [Security][Critical Risk] WAPT-C-1: Default Admin Account Can Reappear #1 Jun 19, 2020
@tostart-pickagreatname
Copy link
Contributor Author

Could not reproduce in dev. I believe this is related to re-loading of the seeds.

@tostart-pickagreatname
Copy link
Contributor Author

Cannot reproduce in the container.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Pull requests that address a security vulnerability
Projects
None yet
Development

No branches or pull requests

1 participant