Password reset token leak via "Host header" on third party website
Unknown
Vulnerability Details
Hi Security Team,
#Product / URL
https://your-store.wholesale.shopifyapps.com/
#Description
It has been identified that the application is leaking Token to third party sites. In this case it was found that the Token is being leaked to third party sites which is a issue knowing the fact that it can allow any malicious users to use the reset password of user.
#Reproduction Instructions /
1) Send reset password link to your email address.
2)Now go to email, turn burp suite intercept on and click on reset password link. Check for the requests having the token in "host" as third party website. And copy the link
3)Now turn intercept off and reset the password.(with that link)
4)Now reset the password.
#Proof of Concept
F1180911
#Additional Information:
Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.
## Impact
As you can see in the `Host` the reset token is getting leaked to third party sites. So, the person who has the complete control over that particular third party site can Use the Token easily.
Actions
View on HackerOneReport Stats
- Report ID: 1092831
- State: Closed
- Substate: resolved
- Upvotes: 7