Password reset token leak on third party website via Referer header
Medium
U
UPchieve
Submitted None
Actions:
Reported by
n1had
Vulnerability Details
Technical details and impact analysis
## Summary:
It has been identified that the application is leaking referrer token to third party sites. In this case it was found that the password reset token is being leaked to third party sites which is a issue knowing the fact that it can allow any malicious users to use the token and reset the passwords of the victim.
## Steps To Reproduce:
1) Request a password reset link for a valid account
2) Click on the reset link
3) Before resetting the password click on webiste
4) You will notice the following request in burpsuite
```
POST /events/1/NRJS-cb3c976936ae1bbb096?a=429165133&sa=1&v=1194.94d5a62&t=Unnamed%20Transaction&rst=56534&ck=1&ref=https://app.upchieve.org/setpassword/e2d710c6e099bf07d63507602a44c176 HTTP/1.1
Host: bam.nr-data.net
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: */*
Accept-Language: en-US,en;q=0.5
```
## Impact
Password reset token leak on third party website via Referer header
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Storing Passwords in a Recoverable Format