Escape from Tarkov exploit allows attackers to log in to any users account
Escape from Tarkov exploit allows attackers to log in to any users account
X Cancelled | Verifying your request
English translation below:
How did the exploit happen? Before someone else posts nonsense. The exploit is easier than you think. It has nothing to do with databases/MongoDB or any of the other nonsense people are saying out there (senior developers).
This is incredibly stupid, and a tremendous security flaw on BSG's part. No data was compromised, no data was exposed, nothing was exposed. This is just a login bypass.
Problem description: The authentication system via Steam (OpenID) does not appear to be correctly validating the digital signature (openid.sig) or the response_nonce returned by the Steam servers.
This allows an attacker to impersonate any user account simply by manually modifying the openid.identity and openid.claimed_id parameters in the return URL.
Affected points:
URL: linkVulnerable parameter: openid.identity / openid.claimed_id
Steps to reproduce (Proof of concept):Start a legitimate login process with Steam.Before the profile page loads, intercept or modify the Steam response URL.
Change the SteamID64 at the end of the openid.claimed_id and openid.identity parameters to that of any other user. The server grants access to the profile of the user whose ID was entered, without having gone through the actual login process for that account.
The problem is how incompetent BSG is. They can't be making these kinds of mistakes as a multi-million dollar company. Leaving endpoints exposed, not verifying on the backend.
Yes, all affected users had Steam linked. Including Insane (agus).