Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security][Critical Risk] WAPT-C-2: Default Admin Account Can Reappear #2 #91

Open
tostart-pickagreatname opened this issue Jun 19, 2020 · 2 comments
Labels
security Pull requests that address a security vulnerability

Comments

@tostart-pickagreatname
Copy link
Contributor

Vulnerability Summary
Testers discovered a scenario in which it is possible to reenable the default admin account even if the password is changed.

Analysis of the Attack
The tester followed these steps to produce this issue:
o Set up the environment via the docker process
o Authenticate to the Portal
o Create a new Admin
o Log out of the default admin and log into the new Admin account o Change the password and delete the default admin account
o Log out of the application
o Try to log into the app with the default admin account -- note that this no longer works
because we changed the password (unlike WAPT-C-1)
o Log in with the new (non-default) admin account
o Demote the role to "Staff"
o Log out
o Try to log into the app with the default admin account -- note that this now reenables the
deleted admin account

@tostart-pickagreatname tostart-pickagreatname added the security Pull requests that address a security vulnerability label Jun 19, 2020
@tostart-pickagreatname tostart-pickagreatname changed the title [Security] WAPT-C-2: Default Admin Account Can Reappear #2 [Security][Critical Risk] WAPT-C-2: Default Admin Account Can Reappear #2 Jun 19, 2020
@tostart-pickagreatname
Copy link
Contributor Author

Could not reproduce in dev. I believe this is related to re-loading of the seeds.

@tostart-pickagreatname
Copy link
Contributor Author

Cannot reproduce in the container.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Pull requests that address a security vulnerability
Projects
None yet
Development

No branches or pull requests

1 participant