functional-vulnerability

1 article
sort: new top best
clear filter
0 7/10

A researcher discovered a critical vulnerability chain in a multi-tenant business data management app: predictable, non-expiring invitation tokens with no signature protection allowed brute-forcing access to organizations, coupled with a secondary issue allowing visibility of pending admin invitations enabled full organizational takeover with minimal detection risk.

Plenum InfoSec Write-ups
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details