TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

PayPal 2FA Bypass

525 pointsby Spydar007over 8 years ago

28 comments

dkopiover 8 years ago
Mistakes were made, and there are definitely lessons to be learned, but if we want to improve the state of security, we really need to change the way we react to these types of bugs.<p>If a service has an outage and a company posts a postmortem, we all think: &quot;wow! that was an interesting bug, lets learn from this&quot;. We shouldn&#x27;t be treating security issues differently.<p>People who make security mistakes aren&#x27;t idiots. They aren&#x27;t negligent. They&#x27;re engineers just like us, who have tight deadlines, blindspots and mistakes. Shaming people and companies for security bugs will only cause less transparency and less sharing of information - making us all less secure.<p>This is a really cool bug. Kudos to the researcher for finding it, responsibly reporting it, and to paypal for fixing it in a timely fashion. Hopefully - this type of bug changes some internal processes and the way the company thinks about 2FA.<p>As for security questions - these are obviously insecure, and should really never be relied on. If you can opt out of security questions - do so. If you can&#x27;t - just generate a random password as the answer. &quot;I_ty&#x2F;:QWuCllV?&#x27;6ILs`O12kl;d0-`1&quot; is an excellent name for your first dog &#x2F; high school. Just don&#x27;t forget to use a password manager to store these.
评论 #12774596 未加载
评论 #12772850 未加载
评论 #12773787 未加载
评论 #12776459 未加载
评论 #12772854 未加载
评论 #12773631 未加载
评论 #12776215 未加载
评论 #12776563 未加载
pkambover 8 years ago
Sounds like a lot of work! Paypal will just turn off two-factor themselves if you ask nicely via an unverified twitter DM.<p><a href="http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;Tu1AN" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;Tu1AN</a><p><a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;SocialEngineering&#x2F;comments&#x2F;3kgw3s&#x2F;paypal_will_disable_an_accounts_2factor_auth_if&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;SocialEngineering&#x2F;comments&#x2F;3kgw3s&#x2F;p...</a>
评论 #12774445 未加载
the7ndover 8 years ago
The simplicity of this exploit demonstrates something profound. The most dangerous things in life are not hidden deep in the weeds. Rather, they stare us in the face in the most obvious spots. It isn&#x27;t the unknown that presents the biggest threat. It is the known that we never gave a second look.
评论 #12772549 未加载
评论 #12772319 未加载
agildehausover 8 years ago
One of my PayPal 2FA phone numbers is listed twice and both cannot be removed (errors when I try). Their support can&#x27;t help with the situation because their side wasn&#x27;t able to see the duplicate.<p>This is not surprising to me.
评论 #12775285 未加载
ryanfreebornover 8 years ago
Is 17 days an acceptable TAT here? I know investigation and fixes can be a challenge, but with the severity of this exploit+PayPal being a serious financial service, I kind of would hope for a faster fix. Maybe I&#x27;m off base...I really don&#x27;t know; curious what others think.<p>How much time would&#x27;ve had to pass (without PayPal doing anything) before the author is ethically obligated to post to HN&#x2F;media&#x2F;etc about the hack? I believe publicizing an (unpatched) exploit like this crosses into criminality, but it would be essential to demonstrate some kind of proof, for credence and gravity. I&#x27;m guessing the community has some standardized guidelines for this sort of thing, but I&#x27;m not aware of them.
评论 #12772303 未加载
评论 #12773934 未加载
评论 #12773101 未加载
xorgar831over 8 years ago
I&#x27;ve seen equally as ridiculous web bugs, computing prices browser side in javascript, credit card numbers encoded in REST API endpoints, financial websites not supporting 2FA at all or mixing http requests into the sites. We&#x27;re solidly in the dark ages of web security still.
评论 #12772327 未加载
评论 #12773121 未加载
discordanceover 8 years ago
Ouch!<p>Also, PayPal really needs to stop using SMS for 2fa.<p>I expect more from a payment processor that is linked to my bank account.
评论 #12772571 未加载
评论 #12772388 未加载
评论 #12772551 未加载
评论 #12772488 未加载
TorKlingbergover 8 years ago
This seems like a good time to rant about PayPal 2FA and its poor usability.<p>Every time I open the PayPal app I have to wait for a text message and type a code across. That should not be necessary! PayPal should count the app as the second factor and only ask for the password. I am happy to us 2FA with Google because I only have to use it when on a new device, or once a month or so in the browser.<p>Second, support 2FA apps like Authy already. SMS based 2FA is both insecure and unreliable.
chirauover 8 years ago
Out of curiosity, how much was the bounty? 3, 4 or 5 digits?
algestenover 8 years ago
I&#x27;m using Verisign&#x27;s VIP Access app (silly name) to generate PayPal&#x27;s 2FA tokens.<p>Good thing is it works without access to my phone.<p>Bad thing, the app has a unique ID that PayPal only allows me to use for one of my three accounts.<p>Wish they implement TOTP.
bad_userover 8 years ago
Does anybody know how to activate 2FA for PayPal?<p>In the security section I don&#x27;t even have that option.
评论 #12772460 未加载
评论 #12772933 未加载
phreackover 8 years ago
This is scarily simple. Profit indeed for a black hat. Coupled with a recent post about Gmail on how phone carriers are the weakest link, I just don&#x27;t feel safe with anything but a dongle based 2fa these days.
评论 #12772384 未加载
评论 #12772377 未加载
DavidWanjiruover 8 years ago
Am I the only one who found it odd that the author had internet access, but there was no phone signal? Maybe it&#x27;s because I&#x27;m Kenyan, where phone penetration is much higher than internet penetration, and where internet access over GSM has the biggest share of the internet access pie chart.
评论 #12772952 未加载
评论 #12773369 未加载
评论 #12774469 未加载
评论 #12777494 未加载
0xmohitover 8 years ago
If I were to guess this flaw was a result of monkey-patching to support 2FA that didn&#x27;t quite consider different scenarios.<p>I&#x27;ve come across a few authentication bypass vulns that seem similar.
nabla9over 8 years ago
The lesson from this:<p>Just looping trough input arguments from the client, validating them and then acting on them gives the client control of the code execution.<p>It&#x27;s not enough to validate each input argument. You musth also verify that all parameters are really there and no extra parameters can slip into the system. The whole combination must make sense. Enumerating all used parameter combinations in a record that can be changed easily is one way to solve this.
ryanlmover 8 years ago
I&#x27;m assuming that the relevant code, is simply an if statement checking for the existence of the url parameters, not even checking if the security questions are correct.<p><pre><code> if(isset($_GET[&#x27;securityQuesiton0&#x27;)) { &#x2F;&#x2F; success, } </code></pre> This is negligence on the developers part and I think they should be disciplined.
评论 #12775455 未加载
评论 #12775498 未加载
danielsamuelsover 8 years ago
I imagine you could have got the same results with inspect element and deleting the form fields, rather than using a proxy.
yashafromrussiaover 8 years ago
What kind of API design is this? Post data should be sent within the request&#x27;s body over HTTPS. Not as a url query.
评论 #12772727 未加载
评论 #12772895 未加载
评论 #12772730 未加载
andrewvijayover 8 years ago
Short and sweet. Never seen a bug explained so succinctly.
TekMolover 8 years ago
What is the additional phone verification good for if you can bypass it anyhow?<p>I mean - if you can chose between pw+phone and pw+pw2 ... why bring the phone into play at all?
greyskullover 8 years ago
What could the backend logic possibly be this worked?
评论 #12772272 未加载
评论 #12772793 未加载
评论 #12772307 未加载
评论 #12772293 未加载
评论 #12772288 未加载
评论 #12772274 未加载
dczmerover 8 years ago
reminds me of this paypal 2fa exploit from a couple years ago:<p><a href="https:&#x2F;&#x2F;duo.com&#x2F;blog&#x2F;duo-security-researchers-uncover-bypass-of-paypal-s-two-factor-authentication" rel="nofollow">https:&#x2F;&#x2F;duo.com&#x2F;blog&#x2F;duo-security-researchers-uncover-bypass...</a><p>because it was the same simple exploit on a different field.
Propenover 8 years ago
It&#x27;s 2016. They are a financial company. Why aren&#x27;t they implementing TOTP codes? NIST officially deprecated SMS.
nobodyshereover 8 years ago
Bypass? Haha, it has been quite a while and they still haven&#x27;t even enabled it for my country. Same goes for Apple.
footaover 8 years ago
Oh my god.
benevolover 8 years ago
This is surreal.<p>Does PayPal outsource their web development to an anonymous script kiddie on 4chan?
评论 #12773306 未加载
评论 #12774991 未加载
rvolkanover 8 years ago
I&#x27;m happy to see that the article doesn&#x27;t have any BS that I have to ignore. It&#x27;s a simple page that only tells the &#x27;required&#x27; story. As a reader, I want more people to cut the crap about &#x27;blah blah blah&#x27; and get to the subject.
评论 #12772442 未加载
评论 #12772500 未加载
jknoepflerover 8 years ago
Thank you to the author for reporting this big in a responsible way. They are a credit to our profession.