Bypassing Authentication: A Critical Flaw in Basecamp’s
研究人员发现Basecamp存在身份验证漏洞,允许攻击者利用旧密码和过时的2FA备用代码绕过新密码验证,实现账户接管。 2025-6-12 06:2:15 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

How Attackers Can Hijack Accounts Using Outdated Passwords and 2FA Backup Codes

Monika sharma

Introduction

You’d think that once a user changes their password, old credentials become useless. But what if I told you that even after the password is updated, you can still log in?

In this write-up, I’ll walk you through an Improper Authentication flaw I discovered in Basecamp, where a previously valid backup 2FA response could be reused to bypass new credentials — giving attackers ghost access to accounts.

Let’s break it down.

Vulnerability Summary

  • Type: Improper Authentication
  • Impact: Account Takeover even after password change
  • Target: Basecamp
  • Reported by: fuzzsqlb0f
  • HackerOne Report ID: 1485788
  • POC: Video attached to report

Steps to Reproduce

The exploit involves a sequence of actions by both the attacker and the victim, as detailed in the original report. Below is a clear breakdown of the steps:

  1. Attacker Knows Victim’s Password and Logs In

文章来源: https://infosecwriteups.com/bypassing-authentication-a-critical-flaw-in-basecamps-849d9fadf39f?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh