UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.4K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Israel Bolsters Defense Independence with Billion-Shekel Elbit Systems Deal

https://undercodenews.com/israel-bolsters-defense-independence-with-billion-shekel-elbit-systems-deal/

@Undercode_News
Forwarded from UNDERCODE TESTING
🦑Broken Access Control: From Password Reset to Mass Account Takeover

A critical vulnerability in the password reset functionality of an API endpoint (/api/u/resetPwd). Here’s how it unfolded:

1️⃣ The endpoint accepts a username parameter and sends a password reset link to the user's email.
2️⃣ The use of "u" in the endpoint (u=user) hinted that other roles like admin (a=admin) or superuser (su) might exist.
3️⃣ Attempts to reset admin passwords via /api/admin/resetPwd and /api/administrator/resetPwd failed.
4️⃣ However, /api/su/resetPwd worked, allowing me to reset the superuser password!
5️⃣ The reset mechanism generated predictable passwords like username + ab12*. For example, resetting for admin resulted in adminab12*.

🎯 Impact: This flaw allowed unauthorized access to critical accounts, leading to mass account takeover.

Ref: Amit Kumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁