How i found first account takeover, reported and got the bounty in same day and in same hour.
作者通过修改重置密码功能中的host header,成功触发了账户接管漏洞,并在短时间内报告并获得了赏金。 2025-9-10 06:4:16 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

How i found, reported and got the bounty of my first easy account take over on the reset password functionality

Assalam o alaikum wa rakh ma tullah

Advance apologise for any mistake

Nice to see you here i am writing my third article which is also very interesting because i found a bug three days ago at 11:30 to 11:40 approximately, reported it at 11:50 and the bounty was rewarded at 12:37 you can see

Press enter or click to view image in full size

Lets start the story, it was my first account takeover i am very excited and must have to share it with all the community

So lets assume the target as target.com and its signup page is on app.target.com i have reported an info disclosure on same program a couple of week ago also but that was not applicable, so after 5 to 7 days i decided to test it again and open the target and was testing for account takeover via host header on forgot password option, forgot password email was looked like “any.app.target.com/reset-password/token?email=myemail.com”

i tried to change the host header from any.app.target.com to any.app.target.com.evil.pk and sent the password reset request, then go to gmail, there is no message then i also change the origin header to any.app.target.com.evil.pk there was also not any response in email, then i changed the origin header to its original form and go to referer header and change it to any.app.taget.com.evil.pk and…


文章来源: https://infosecwriteups.com/bismillah-hir-rahman-nir-raheem-9adef82e9718?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh