Loading HuntDB...

Bypass Email Verification on Add Email Monitoring

Medium
M
Mozilla
Submitted None

Team Summary

Official summary from Mozilla

A security vulnerability has been identified in the email verification process of Mozilla Monitor. The issue allows an attacker to bypass the email verification step when adding a new email address for monitoring. The vulnerability exploits a flaw in the verification mechanism where the verification token is exposed in the server response. By using this token, an attacker can manually verify any email address without having access to the associated inbox. This bypass enables unauthorized addition of email addresses to the monitoring service, leading to denial of service for users.

Reported by dotxml

Vulnerability Details

Technical details and impact analysis

Information Disclosure
## Steps To Reproduce: 1. Login to https://monitor.firefox.com OR https://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net and click **Add email address** █████████ 2. Fill the victim's email address (I'm use my personal email) and click **Send verification link** ██████ 3. Check the request on your burp suite intercept and turn on **Response intercept** to this request ████████ 4. Wait until we got the response from the server and search the victim's email address, we can get the **verification_token** on the response ███████ 5. For make sure the victim's email address is need a verification.. refresh your browser █████ 6. Copy and Paste the **verification_token** from the response to this link: `https://stage.firefoxmonitor.nonprod.cloudops.mozgcp.net/api/v1/user/verify-email?token={verification_token}` 7. Open the link on your browser, Done.. the victim's email address is already verified ██████ ## Impact Attacker can add the victim's email address without verification. And if attacker choose **Send all breach alerts to primary email address**, attacker will get a notification when victim's email address is leaked {F3074332}

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure