Loading HuntDB...

Ticket Trick at https://account.acronis.com

High
A
Acronis
Submitted None
Reported by sayaanalam

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
## Summary Hello dear team, I found a serious issue in Acronis This vulnerability is called ticket trick vulnerability which comes under critical category. Which can allow me to login on websites like atlassian,github,clouflare,choopa,..etc on behalf of [email protected] . ## Steps To Reproduce Lets take an example to get your github account. 1. As Github send account register verification mails from [email protected] 2. I registered an account on acronis with same email. 3. Now your support system creates ticket of emails sent to [email protected] . 4. So I registered an account on github and logged into my acronis account with email [email protected] . 5. As Acronis allowed me to see support tickets without email verification , so I was able to see support tickets easily created by [email protected] . 6. On support ticket there was an email verification link sent to [email protected] . 7. In this way I was able to takeover many account registered with [email protected] and many internal accounts that can be accessed with only @acronis.com ##POC I was able to register a github account on your email address :- {F1022537} ##Resources about this vulnerability:- https://hackerone.com/reports/498964 https://medium.com/intigriti/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c ## Impact * Critical Email Takeover * Ticket Trick Thanks for reading my report. Best Regards Sayaan Alam

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$750.00

Submitted

Weakness

Improper Access Control - Generic