$100 Bounty: How a Spoofed Email Could Change Any Username on HackerOne
安全研究员发现HackerOne存在流程漏洞:通过伪造邮件可接管用户名和资料链接。该漏洞利用支持团队处理用户名更改请求的流程。研究员因此获得$100赏金。 2025-5-8 05:15:18 Author: infosecwriteups.com(查看原文) 阅读量:11 收藏

A simple email spoofing trick could let anyone hijack your HackerOne username and profile link

Monika sharma

Introduction

In today’s world of responsible disclosure bug bounty platforms like HackerOne hold massive importance. They track researchers’ reports award bounties and maintain public Hall of Fame profiles showcasing each hacker’s achievements.
But what if someone could quietly take over your username and profile link without accessing your account?
Security researcher abuseing uncovered a critical process flaw that allowed exactly this all with just a spoofed email. For this clever discovery they were awarded a $100 bounty under Report ID #25281.
Let’s dive into how this bug worked why it mattered and how it was fixed.

What was the vulnerability?

At its core, the issue exploited HackerOne’s support process for handling username change requests.

Here’s the normal workflow

  • A user emails [email protected] requesting a username change.
  • The support team replies: Please confirm this request from the email associated…

文章来源: https://infosecwriteups.com/100-bounty-how-a-spoofed-email-could-change-any-username-on-hackerone-8efd98ab44f5?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh