Account Take Over | P1 — Critical
嗯,用户发来一个请求,让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读用户提供的文章内容,理解其主要信息。 文章讲的是作者收到一个私人漏洞赏金计划的邀请,测试了一个网站的“Forgot Password”功能。发现了严重的漏洞:攻击者可以利用该功能接管他人账户。漏洞的解释包括攻击者和受害者两个账户,通过重置密码请求和截获请求来实现账户接管。 接下来,我需要将这些关键点浓缩到100字以内。要确保包含主要事件:收到邀请、测试功能、发现漏洞、漏洞的影响以及利用工具如Burp Suite。 然后,检查是否有冗余的信息可以省略,比如具体的步骤细节。确保语言简洁明了,直接描述事件和结果。 最后,整合这些信息,形成一个流畅的总结句。确保不超过字数限制,并且准确传达文章的核心内容。 </think> 作者收到私人漏洞赏金邀请后测试网站“Forgot Password”功能,发现严重漏洞:攻击者可利用该功能接管他人账户。漏洞允许攻击者通过重置密码请求和截获请求锁定 victim 账户并获取控制权。 2025-10-13 07:24:47 Author: infosecwriteups.com(查看原文) 阅读量:129 收藏

Irsyad Muhammad Fawwaz

Press enter or click to view image in full size

It started off like any other day until I got an unexpected email — an invite to a private bug bounty program. Curious, I jumped in. The target? A website we’ll call redacted.com.

I began testing the usual stuff — login pages, account settings, and then the “Forgot Password” feature. At first, everything seemed normal: enter your email, get a reset link. But as I dug deeper, I found something strange. There was a flaw that could let an attacker take over someone else’s account using the password reset feature.

It wasn’t obvious — pretty well-hidden, actually — but if exploited, it could allow someone to completely lock out a victim and take control of their account. Serious stuff.

Vulnerability Explanation:

Let’s break it down step by step:

  1. Setup: I have two accounts: one for the attacker ([email protected]) and one for the victim ([email protected]).
  2. Initial Request: The attacker initiates a "Forgot Password" request using their own email ([email protected]).
  3. Password Reset Link: A password reset link is sent to the attacker's email. The attacker clicks the link, leading to the page where they can set a new password.
  4. Intercepting the Request: Using Burp Suite, the attacker fills in the new…

文章来源: https://infosecwriteups.com/account-take-over-p1-critical-5468ce8218b9?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh