0 Click account takeover via timed requests to ███████forgot-password (single-packet attack)
High
M
Mars
Submitted None
Team Summary
Official summary from Mars
An account takeover vulnerability was present in the forgot password functionality of ██████████. By sending carefully timed requests using a single-packet attack to the ████forgot-password path, an attacker is able to obtain the password reset token for any account on the platform. This attack requires only knowledge of the victim's email address registered on █████████████████████████████████.
Actions:
Reported by
0x999
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Use of a Broken or Risky Cryptographic Algorithm