session-management

8 articles
sort: new top best
clear filter
0 7/10

A critical authentication bypass vulnerability in Companies House allowed unauthenticated access to any company's dashboard by using the browser back button after failing authentication. The flaw exposed personal information (home addresses, email, full dates of birth) for 5 million directors and enabled editing of company details and filing of accounts.

Companies House John Hewitt Ghost Mail Dan Neidle Jonathan Philips ClarityDW Ltd
taxpolicy.org.uk · pavel_lishin · 2 hours ago · details · hn
0 2/10
documentation

GitHub's sudo mode feature requires re-authentication for sensitive account actions (email changes, SSH key additions, PAT creation, third-party app authorization) with a 2-hour session timeout. Users can confirm access via password, passkey, security key, GitHub Mobile, 2FA code, or social login email.

GitHub
docs.github.com · mooreds · 7 hours ago · details · hn
0 5/10

A 2FA bypass vulnerability was discovered on Pandao.ru (Mail.ru's extended program) where CSRF tokens used to disable 2FA never expire, allowing an attacker to reuse the same token to disable 2FA on victim accounts. The vulnerability was reported but no bounty was awarded as the program excludes client-side attacks.

Mail.ru Pandao.ru HackerOne BurpSuite Vishal Bharad
vbharad.medium.com · kh4sh3i/bug-bounty-writeups · 20 hours ago · details
0 8/10

A logic flaw in 2FA implementation across multiple platforms (Google, Microsoft, Instagram, Cloudflare) allows an attacker to maintain persistence after password recovery by exploiting session renewal in the 2FA page and leveraging the fact that disabled 2FA codes still validate, enabling account takeover without knowing the current password.

Google Microsoft Instagram Facebook Cloudflare Algolia GitHub LinkedIn Luke Berner HackerOne Bugcrowd
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

A bug bounty writeup demonstrating how multiple vulnerabilities (CORS misconfiguration, open redirect, XSS, session non-invalidation, and logical bugs) were chained together to achieve full account takeover and steal user data including email addresses, discount codes, and purchase history.

Mashoud1122 HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

Ribose had an IDOR vulnerability allowing attackers to delete or modify other users' profile photos by simply changing the user ID in DELETE/POST requests while reusing their own valid CSRF token and session, effectively bypassing authorization checks.

Ribose
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

A CSRF vulnerability on Mail.ru's Pandao.ru subdomain allowed disabling 2FA on victim accounts by reusing a non-expiring CSRF token, demonstrating a client-side authentication bypass technique via malicious HTML file delivery.

Mail.ru Pandao.ru HackerOne Vishal Bharad BurpSuite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 1/10

Parevo Core is a modular Go library that consolidates authentication, multi-tenancy, and permission management (RBAC/ABAC) across common web frameworks and databases. It provides auth primitives (JWT, OAuth2, SAML, LDAP, WebAuthn), tenant isolation with SQL filters, and pluggable storage adapters for MySQL, Postgres, MongoDB, and Redis.

Parevo Core Go
github.com · parevo · 20 hours ago · details · hn