Account takeover using reset password link
Medium
M
Mars
Submitted None
Team Summary
Official summary from Mars
A vulnerability was found in the Mars website (█████████) where the reset password functionality can be manipulated. The reset password link sent via email contains a parameter that specifies the path of the reset password page. An attacker can modify this parameter to redirect users to a domain under their control when the link is clicked. This allows the attacker to obtain the password reset token and use it to reset the user's password, gaining unauthorized access to their account.
Actions:
Reported by
haoshokunoo
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Open Redirect