Account Take Over | P1 — Critical
作者发现了一个隐藏在“忘记密码”功能中的安全漏洞,可导致攻击者通过重置密码接管他人账户。利用该漏洞时,攻击者先用自己的邮箱发起重置请求,随后通过工具拦截请求并修改参数以获取受害者账户的控制权。 2025-10-13 07:24:47 Author: infosecwriteups.com(查看原文) 阅读量:145 收藏

Irsyad Muhammad Fawwaz

Press enter or click to view image in full size

It started off like any other day until I got an unexpected email — an invite to a private bug bounty program. Curious, I jumped in. The target? A website we’ll call redacted.com.

I began testing the usual stuff — login pages, account settings, and then the “Forgot Password” feature. At first, everything seemed normal: enter your email, get a reset link. But as I dug deeper, I found something strange. There was a flaw that could let an attacker take over someone else’s account using the password reset feature.

It wasn’t obvious — pretty well-hidden, actually — but if exploited, it could allow someone to completely lock out a victim and take control of their account. Serious stuff.

Vulnerability Explanation:

Let’s break it down step by step:

  1. Setup: I have two accounts: one for the attacker ([email protected]) and one for the victim ([email protected]).
  2. Initial Request: The attacker initiates a "Forgot Password" request using their own email ([email protected]).
  3. Password Reset Link: A password reset link is sent to the attacker's email. The attacker clicks the link, leading to the page where they can set a new password.
  4. Intercepting the Request: Using Burp Suite, the attacker fills in the new…

文章来源: https://infosecwriteups.com/account-take-over-p1-critical-5468ce8218b9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh