2FA requirement bypass when inviting team members
Vulnerability Summary
HackerOne disclosed report --> https://hackerone.com/reports/3356149
Summary:
The application requires users to enable 2FA before sending team invitations. However, this restriction can be bypassed by modifying client-side responses (match and replace from false to true). This allows invitations to be sent without enabling 2FA, defeating the security requirement.
Steps To Reproduce:
-
Sign up / log in to the application.
-
Go to the Team section.
-
Try to invite a new member → the application blocks the request, requiring 2FA. {F4819623}
-
Use a Burp extension ( Match and Replace) to change the client-side flag
false → true. {F4819627} -
Refresh the page then attempt to send an invitation again.
-
The invitation is sent successfully without enabling 2FA. {F4819634}
Impact
-
This bypass allows attackers to ignore the enforced security policy.
-
Reduces the effectiveness of 2FA enforcement.
-
Could allow compromised accounts to invite unauthorized users without 2FA protection.