User guessing/enumeration at https://app.c2fo.com/api/password-reset

Disclosed: 2014-05-19 12:03:17 By internetwache To c2fo
Unknown
Vulnerability Details
Hi there, I noticed a small information leak which allows an attacker to check whether an email address is associated with an account. ###Steps to reproduce: 1. Send a POST-Request to the url https://app.c2fo.com/api/password-reset as the following example shows: ``` POST /api/password-reset HTTP/1.1 Host: app.c2fo.com Content-Type: application/x-www-form-urlencoded Content-Length: 37 emailAddress=test%40internetwache.org ``` 2. I registered an account with the email address, thus the server will respond with ```{"inReset":true}```, which means that the address is in use. 3. Now resend the request again, but with an invalid address like "[email protected]". The application will tell use the following: ```{"error":"invalid_email_address"}```. This way I can validate email addresses against your service. ###Suggested fix: You should always return a status message like: "If your email exists in our database, you'll receive a reset link". That way an attacker cannot distinguish between the two cases. Thanks, Sebastian
Actions
View on HackerOne
Report Stats
  • Report ID: 5688
  • State: Closed
  • Substate: resolved
  • Upvotes: 2
Share this report