Bypass Email Verification in Customer Portal
Low
M
Mattermost
Submitted None
Actions:
Reported by
0dx
Vulnerability Details
Technical details and impact analysis
Hi team hope you doing well :)
i found a vulnerability [ OTP Bypass ] on [ https://portal.test.cloud.mattermost.com ] .
Summery :
I was able to use the otp that was sent to victim email and i used it in the attacker's email verify .when i tried this issue first time the server log me out , and second time i do intercept for request and i was still in and click [next step ] on payment step and am still in without the server log me out and stop the burp after that and am in and i can using my account normally .
## Steps To Reproduce:
1. [make two account : victim / attacker]
1. [ used otp that send to victim and inter it on attacker email verify and intercept the request by burp. ]
1. [when you doing intercept by burp click on next step and full the form and click enter and you can stop proxy and you can used the account normally. ]
## Supporting Material/References:
[https://link.medium.com/xFYjx29xAmb]
## Impact
OTP bypass .
Report Details
Additional information and metadata
State
Closed
Substate
Resolved