$100 Bounty: How a Spoofed Email Could Change Any Username on HackerOne
安全研究员发现HackerOne平台存在漏洞:攻击者通过伪造邮件可劫持用户名和链接,无需访问账户即可完成更改。该漏洞已被修复,并获得$100赏金。 2025-5-8 05:15:18 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

A simple email spoofing trick could let anyone hijack your HackerOne username and profile link

Monika sharma

Introduction

In today’s world of responsible disclosure bug bounty platforms like HackerOne hold massive importance. They track researchers’ reports award bounties and maintain public Hall of Fame profiles showcasing each hacker’s achievements.
But what if someone could quietly take over your username and profile link without accessing your account?
Security researcher abuseing uncovered a critical process flaw that allowed exactly this all with just a spoofed email. For this clever discovery they were awarded a $100 bounty under Report ID #25281.
Let’s dive into how this bug worked why it mattered and how it was fixed.

What was the vulnerability?

At its core, the issue exploited HackerOne’s support process for handling username change requests.

Here’s the normal workflow

  • A user emails [email protected] requesting a username change.
  • The support team replies: Please confirm this request from the email associated…

文章来源: https://infosecwriteups.com/100-bounty-how-a-spoofed-email-could-change-any-username-on-hackerone-8efd98ab44f5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh