Spamming any user from Reset Password Function

Disclosed: 2016-05-03 03:52:03 By coolboss To security
Unknown
Vulnerability Details
It is possible to spam any user whose email-id is known. This can be combined with csrf attack i.e automated to send 50 emails with a click. This is reset password form ---> <form accept-charset="UTF-8" action="https://hackerone.com/users/password" class="new_user" id="new_user" method="post"><div style=""><input name="utf8" value="✓" type="hidden"><input name="authenticity_token" value="AjjZNIMzdX598CXInx9CMbovtHbiqL+ziw4qTJ7RFnZQh/oub+mYFKjjNb1TXyITVCpkFPJ21ViG4IQz72KbMQ==" type="hidden"></div> <h1 class="narrow-title">Forgot password</h1> <div class="narrow-container"> <p>To retrieve your password enter the email address you used to sign up.</p> <div class="input-wrapper-small"> <input autofocus="autofocus" class="input" id="user_email" name="user[email]" placeholder="Email address" type="email"> </div> <input class="button success is-full-width" data-disable-with="Sending..." name="commit" value="Send" type="submit"> </div> </form> Here, <input name="authenticity_token" value="AjjZNIMzdX598CXInx9CMbovtHbiqL+ziw4qTJ7RFnZQh/oub+mYFKjjNb1TXyITVCpkFPJ21ViG4IQz72KbMQ==" type="hidden"> authencity token can be used more than one. Users can be spammed heavily by just simple coding a script. Only email-id should be known. I tried it on my own account. I was able to use the token for more than 5 attempts. This is not best practice. Only one try must be allowed.
Actions
View on HackerOne
Report Stats
  • Report ID: 12782
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 4
Share this report