Breaking In Through the Backdoor: Password Reset Gone Wrong
文章揭示了target.com密码重置系统中的严重漏洞。攻击者可利用该漏洞仅凭用户邮箱地址接管账户。问题源于六位数验证码被错误配置至邮箱验证端点。 2025-5-15 04:55:27 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

Imagine being able to take over any user’s account on a platform — even without their interaction. No phishing, no social engineering, and no need for access to their inbox. Just a few crafted steps using the password reset feature, and suddenly, you’re inside their account with full control.

That’s exactly what I discovered on target.com during a deeper investigation into how their password reset system works. This vulnerability was not just dangerous — it was critical. It affected every user on the platform, regardless of whether they were verified or not. In this article, I’ll walk you through how a misconfiguration in their routing allowed full account takeover for any user with just their email address.

When a user requests a password reset on target.com, they receive a link in their email. This link usually leads to a secure password reset form and also includes a six-digit code. So far, that seems normal.

But here’s the problem: the six-digit code received in the email isn’t just used for resetting the password. Due to a misconfigured routing setup, this same code also works on another route — the email verification endpoint.


文章来源: https://infosecwriteups.com/breaking-in-through-the-backdoor-password-reset-gone-wrong-6e5243c16a19?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh