Email Verification Bypass via Race Condition
None
M
Malwarebytes
Submitted None
Actions:
Reported by
sijojohnson
Vulnerability Details
Technical details and impact analysis
An email verification bypass vulnerability was discovered in the my.malwarebytes.com.
##Steps to Reproduce
- Create an account using an attacker email: [email protected].
- Verify the account.
- Go to account settings and update the email address to [email protected].
- Capture the request using a tool like Burp Suite.
- Send the request to Repeater twice and forward the request.
- In Repeater, modify Request 1 by changing the email to the victim's email (e.g., [email protected]).
- In Request 2, use the attacker's email ([email protected]).
- Group both requests, select Send Group in Parallel, and send the requests.
- Observe the email inbox—both the victim's and attacker's email addresses will receive the same OTP.
- Go to confirmation page displayed, Enter the OTP (both OTP's are same),
- Capture the request, and replace the email with the victim’s email.
- Send the modified request and observe the response.
- The victim’s email address is now successfully verified.
##PoC
{F4105917}
## Impact
- This vulnerability allows an attacker to take control of an account associated with a victim's email by changing the registered email address.
- It presents a risk of data theft, unauthorized transactions, and further exploitation of linked accounts.
- Users' personal and sensitive data may be compromised.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Improper Authentication - Generic