• TimeSquirrel@kbin.melroy.org
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    10 months ago

    Simply removing the two-factor auth element which does nothing to access the main page underneath. I do that shit with newspaper paywalls. That is wild.

    Also having a script in there that just resets a password no questions asked. WTF is going on with modern software development? It isn’t just Subaru. It’s almost everything in the last 15 years. Behind all the pretty lipstick, IT systems are jankier than ever.

    For any aspiring programmers, remember, never ever assume the user is rational, expecting them to follow the rules. At least half of your user data-handling code should be validation and sanity checks. Code defensively.

    • TheKMAP@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      That password reset looked to be like step four of something. So it’s a business logic bypass. Still awful of course but slightly more understandable given other ways this vulnerability could have been introduced. The cool part was detecting all the steps completely blackbox because everything was in the Javascript.

      There is no excuse for issuing a valid token before mfa succeeds though. That is negligent.

    • Viri4thus@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      10 months ago

      Subcontracted to Indian, Ucranian and other low income countries. You get what you pay for.