Loading HuntDB...

Email Verification Bypass via Race Condition

None
M
Malwarebytes
Submitted None
Reported by sijojohnson

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
An email verification bypass vulnerability was discovered in the my.malwarebytes.com. ##Steps to Reproduce - Create an account using an attacker email: [email protected]. - Verify the account. - Go to account settings and update the email address to [email protected]. - Capture the request using a tool like Burp Suite. - Send the request to Repeater twice and forward the request. - In Repeater, modify Request 1 by changing the email to the victim's email (e.g., [email protected]). - In Request 2, use the attacker's email ([email protected]). - Group both requests, select Send Group in Parallel, and send the requests. - Observe the email inbox—both the victim's and attacker's email addresses will receive the same OTP. - Go to confirmation page displayed, Enter the OTP (both OTP's are same), - Capture the request, and replace the email with the victim’s email. - Send the modified request and observe the response. - The victim’s email address is now successfully verified. ##PoC {F4105917} ## Impact - This vulnerability allows an attacker to take control of an account associated with a victim's email by changing the registered email address. - It presents a risk of data theft, unauthorized transactions, and further exploitation of linked accounts. - Users' personal and sensitive data may be compromised.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Authentication - Generic