Loading HuntDB...

Exposure of account recovery hint by querying by user email

Low
M
Mozilla
Submitted None

Team Summary

Official summary from Mozilla

The account recovery location hint was exposed by directly querying the recoveryKey API with a user email. The hint is used to remind the user where they stored their recovery key and leaking the hint does not pose immediate security risk on the user's account. However, the API could have been used for user account enumeration. The API was disabled since it is not yet used in the application UI.

Reported by francisconeves97

Vulnerability Details

Technical details and impact analysis

Exposure of Sensitive Information Due to Incompatible Policies
## Summary: Hey all! Hope everything is good! While testing I noticed that I can issue queries to https://api.accounts.firefox.com/v1/recoveryKey/[email protected] to get a specific user Account Recovery Keys hint. This does not seem like an issue on itself but could be used to escalate phishing attacks for example. The page where you input the hint displays the following: {F2866742} But I am considering this should not be public information, and only be available to a user by a email link. ## Steps To Reproduce: Go to https://api.accounts.firefox.com/v1/recoveryKey/hint?email=███████ and check my hint. ``` GET /v1/recoveryKey/hint?email=███ HTTP/2 Host: api.accounts.firefox.com Sec-Ch-Ua: "Chromium";v="119", "Not?A_Brand";v="24" Sec-Ch-Ua-Mobile: ?0 Sec-Ch-Ua-Platform: "macOS" Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Sec-Fetch-Site: none Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Accept-Encoding: gzip, deflate, br Accept-Language: en-GB,en;q=0.9 Priority: u=0, i ``` ## Impact Leaking any user's Account Recovery Keys hint can be used to steal user's keys or craft more complex phishing attacks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Exposure of Sensitive Information Due to Incompatible Policies