Ticket Trick at https://account.acronis.com
High
A
Acronis
Submitted None
Actions:
Reported by
sayaanalam
Vulnerability Details
Technical details and impact analysis
## Summary
Hello dear team,
I found a serious issue in Acronis
This vulnerability is called ticket trick vulnerability which comes under critical category. Which can allow me to login on websites like atlassian,github,clouflare,choopa,..etc on behalf of [email protected] .
## Steps To Reproduce
Lets take an example to get your github account.
1. As Github send account register verification mails from [email protected]
2. I registered an account on acronis with same email.
3. Now your support system creates ticket of emails sent to [email protected] .
4. So I registered an account on github and logged into my acronis account with email [email protected] .
5. As Acronis allowed me to see support tickets without email verification , so I was able to see support tickets easily created by [email protected] .
6. On support ticket there was an email verification link sent to [email protected] .
7. In this way I was able to takeover many account registered with [email protected] and many internal accounts that can be accessed with only @acronis.com
##POC
I was able to register a github account on your email address :-
{F1022537}
##Resources about this vulnerability:-
https://hackerone.com/reports/498964
https://medium.com/intigriti/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c
## Impact
* Critical Email Takeover
* Ticket Trick
Thanks for reading my report.
Best Regards
Sayaan Alam
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$750.00
Submitted
Weakness
Improper Access Control - Generic