$1,000 Bug: Firefox Account Deletion Without 2FA or Authorization
安全研究员发现Mozilla账户管理API存在重大漏洞,攻击者可通过未认证的POST请求删除Firefox用户账户,仅需目标用户密码且无需两步验证或授权头。该漏洞因后端验证缺失导致。 2025-6-8 05:39:25 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

How a Missing Backend Check Let Attackers Nuke Accounts With Just a Password

Monika sharma

Summary

Security researcher erdy uncovered a serious vulnerability in Mozilla’s account management API. The flaw allowed attackers to delete any Firefox user account by sending a single unauthenticated POST request — provided they knew the user’s password. Shockingly, the endpoint `/v1/account/destroy` did not require two-factor authentication (2FA) or even an Authorization header.

This vulnerability highlights a major oversight in backend validation, especially in high-impact actions like account deletion.

Bug Bounty Reward: \$1,000

The Vulnerable Endpoint

The Mozilla account API exposed the following endpoint:

POST https://api-accounts.stage.mozaws.net/v1/account/destroy

This endpoint was responsible for account deletion and expected only two fields in the body:

{
"email": "<target_email>",
"authPW": "<hashed_password>"
}

No Authorization header or valid session token was required. Even more concerning — the authPW value was generated client-side, using public JavaScript…


文章来源: https://infosecwriteups.com/1-000-bug-firefox-account-deletion-without-2fa-or-authorization-e7a6c5bfd028?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh