Password reset token leakage
High
U
UPchieve
Submitted None
Actions:
Reported by
spaced
Vulnerability Details
Technical details and impact analysis
Reset Password link : http://hackers.upchieve.org/setpassword?token=a3c448b1eb9b982f93ec39a7181ec1a2
1.Open Password reset page from email.
2.Intercept the request(I have used burp suite)
3.You can see the link for reset password in below requests
POST /j/collect?v=1&_v=j93&a=1038273919&t=pageview&_s=1&dl=https%3A%2F%2Fhackers.upchieve.org%2Fsetpassword%3Ftoken%3Da3c448b1eb9b982f93ec39a7181ec1a2&dp=%2Fsetpassword&ul=en-us&de=UTF-8&dt=UPchieve&sd=24-bit&sr=1366x768&vp=1366x657&je=0&_u=wCCAAUABAAAAAC~&jid=185704536&gjid=1537782490&cid=83313712.1632910097&tid=UA-133171872-1&_gid=1095396647.1632910097&_r=1>m=2ou9r0&z=1390812166 HTTP/2
Host: www.google-analytics.com
Content-Length: 0
Sec-Ch-Ua: "Chromium";v="93", " Not;A Brand";v="99"
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36
Sec-Ch-Ua-Platform: "Windows"
Content-Type: text/plain
Accept: */*
Origin: https://hackers.upchieve.org
Sec-Fetch-Site: cross-site
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
POC video : recording-1632911031270.webm
@thug645
## Impact
Misconfiguration
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Misconfiguration