Logging a user into attacker's account using password reset link
M
Mapbox
Submitted None
Team Summary
Official summary from Mapbox
On March 26th, 2015 @shahmeer-amir reported an issue with the password reset flow for www.mapbox.com that required social engineering to exploit. We patched the issue and awarded a bounty on April 7th, 2015. Please note that this was not related to denial of service or the institution of an account recovery policy, both of which are out of scope for the Mapbox HackerOne program.
Actions:
Reported by
shahmeer-amir
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$600.00
Submitted
Weakness
Violation of Secure Design Principles