Loading HuntDB...

[Part II] Email Confirmation Bypass in myshop.myshopify.com that Leads to Full Privilege Escalation

Critical
S
Shopify
Submitted None

Team Summary

Official summary from Shopify

On February 14th, while verifying the fix for https://hackerone.com/reports/791775, @ngalog identified another bug allowing someone to verify an email address they did not own. The bug could have given access to a small subset of Shopify user accounts the user did not own. Our team immediately disabled the impacted functionality and deployed a permanent fix two hours later.

Reported by ngalog

Vulnerability Details

Technical details and impact analysis

## Summary In #791775, I submitted a bug at Sunday 5pm Canada time, it was triaged two hours later, and I got the **temp** fix message at around 3am the next day in Canada time. Truly awesome, the next day I retested after the first fix, and found that I - Cannot receive the email confirmation in the email used to sign up - Cannot integrate across stores/partner even they share the same email address after confirming them And the report was later resolved after I verified the fix. For some reason, I decided to test again to see what's something new that I can find. Then I found user can change their email prior to receiving the verification message on their original email. i.e. the same technique, I don't know what went wrong in my first retest, but Shopify security and engineering team again showed their professionalism, quickly resolving the second comments I left in ~3.5 hrs. And when I thought this is the end of story, I later received a comment asking me to open a new report about the second retest, and here I am writing this report. Thanks, Ron ## Impact .

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted