$1000 Bounty: Account Takeover via Host Header Injection in Password Reset Flow
文章描述了一次通过Host头注入攻击成功接管账户的经历。攻击者利用密码重置功能中的漏洞,操控请求头中的Host值,最终实现账户完全控制,并获得1000美元奖励。 2025-5-6 07:14:37 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

A simple header… a full takeover.

Hey folks!

Today I want to share one of my favorite findings — a simple but deadly Host Header Injection that led to full account takeover via password reset link manipulation. It’s wild how a single overlooked header can lead to such critical impact.

Let me walk you through how I found this bug, chained it for max effect, and walked away with a $1000 reward.

Like any good recon session, I was exploring forgotten corners of target.com when I decided to test their password reset functionality. Why? Because “Forgot Password” flows are often goldmines — especially when developers get lazy with URL generation.

I typed in my email, hit the “Reset” button, and intercepted the request with Burp Suite.

Here’s the request:

POST /signup/send-password-reset-email HTTP/1.1
Host: target.com
Content-Type: application/json
Content-Length: ...

So far, nothing unusual — but I had a hunch.


文章来源: https://infosecwriteups.com/1000-bounty-account-takeover-via-host-header-injection-in-password-reset-flow-dc0cdb2d972b?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh