2FA bypass
They are then assigned a cookie that relates to their account, before being taken to the second step of the login process:
When submitting the verification code, the request uses this cookie to determine which account the user is trying to access:
In this case, an attacker could log in using their own credentials but then change the value of the account cookie to any arbitrary username when submitting the verification code.
Last updated