Hi Hammad,

there’s no bounty and there never will be, this is open source project run by 
volunteers, so thank you for reporting this and contributing to the PHP project.

Ondrej
--
Ondřej Surý <ond...@sury.org> (He/Him)

> On 9. 2. 2023, at 22:51, Hammad khan <hammadkhan88...@gmail.com> wrote:
> 
> 
> Hey Team,
> 
> I'm a penetration tester and bug bounty hunter. I have found a potential 
> vulnerability in the site. Please review the report below.
> 
> Vulnerability: Broken Authentication & Session Management
> We have observed that when we change "password" from one browser in place of 
> session expiration from another browser it just updates the password from 
> another browser and the old session gets updated without being logged out. 
> The flows goes like this:
> Broken Authentication and Session Management > Failure to Invalidate Session 
> > On Password Change
> Steps:
> 1- Login from two browsers at a time [From Chrome browser and from Mozilla 
> Firefox].
> 2- Change password in settings from chrome browser.
> 3- Now Check Mozilla Firefox.
> 4- Your Session got "updated" in place of expiration.
> 
> Same goes with when using two different computer systems.
> 1- Login from two computers at a time
> 2- Change password in settings from computer A.
> 3- Now Check computer B.
> 4- Your Session got "updated" in place of expiration.
> 
> Recommendations: If Session is Updating from one Browser/Computer so other 
> should expire first to renew session after login.
> 
> If you require any additional information, please let me know. I'll be 
> waiting to hear from your side regarding the report and bounty.
> 
> --
> Regards,
> Hammad

--
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to