Editor's note: This is the fifth article in a seven-part series by Chetan Conikee.
In my previous post we witnessed how a bidding process can be abused in an online auction marketplace.
All of us use SaaS services in this cloud era. Our systems use services like Okta for uniauth, Stripe for payments, Sendgrid for email notifications, HubSpot for customer success and Pusher for real time push based notifications.
The actors in this story are CoinBase (the popular Bitcoin wallet) and its use of Pusher to dispatch transactional notifications, directed by Amir. Like a typical SaaS vendor, a Pusher account is created by Coinbase leading to the allotment of a API SDK with an auth token. This auth token enabled the API consumer to create/view/export notification (perhaps each with a unique ID).
The normal process was not followed when the session was terminated and device unconfirmed
This is another type of flaw that’s all but impossible for an automated web application vulnerability scanner to find.