CSRF to account takeover in https://█████/

Disclosed: 2020-11-09 17:10:23 By i_hack_everyone To deptofdefense
Critical
Vulnerability Details
Hi DoD team, I found a CSRF to account takeover in https://███████/ ## NOTE: Try to open the site in firefox because chrome sometimes is not allowing to open the site. ## Summary: There is no protection against CSRF in changing email which lead to CSRF to account takeover on https://██████/. ## Step-by-step Reproduction Instructions ## I have made a video POC in which I have shown the account takeover clearly Please do watch for better understanding 1. Login as victim and check your infos in the account details 2. Open the CSRF malicious file which I have attached (csrf_POC.html) 3. Now the email is different (you can also change your name and other fields as well) 4. Now you can simply takeover the account 5. All you have to do is click on reset password on main page and enter the email you used to trick the victim and you will get instructions to reset the password. And you can successfully takeover the account ## Suggested Mitigation/Remediation Actions Use captchas and CSRF-tokens for be sure that the victim is changing the datas knowing that. ## Impact It is a critical issue as i was able to takeover anyone account using this attack. This vulnerability is high/critical because I was able to perform account takeover
Actions
View on HackerOne
Report Stats
  • Report ID: 1018270
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report