Loading HuntDB...

Account take over of 'light' starbuckscardb2b users

High
S
Starbucks
Submitted None

Team Summary

Official summary from Starbucks

zude discovered that 'light' accounts on https://www.starbuckscardb2b.com could be taken over by registering a new account with the same email address. 'Light' accounts were defined as those that had been created but not used to add a payment method or complete a checkout. @zude — thank you for reporting this vulnerability and confirming the resolution.

Reported by zude

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
This issue was found on https://www.starbuckscardb2b.com, this website belongs to starbucks and its is a critical vulnerability so I am reporting this. ```Issue:``` An attacker can takeover the account of the victim by creating a new account by using victim's (who is already registered) email address. Steps to reproduce are as follows: 1. Open https://www.starbuckscardb2b.com and go to create account. 2. for example user successfully created the account with ```[email protected]``` and password ```12345678``` 3. Now attacker will create the account with the email used in step 2 ```[email protected]``` with different password. 4. After completion of step 3 the password for the ```[email protected]``` user will be set to the password used by attacker. 5. This will result in the account take over by attacker. ## Impact An attacker can take over the control of any/all registered users.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic