0-Click ATO Due to Weak Reset Password Tokens and Lack of Rate Limiting

Description

sallam
1 min readJul 28, 2024

In our latest cybersecurity research, we discovered a significant vulnerability in the password reset functionality of a well-known corporation’s private bug bounty program on HackerOne. The flaw lies in the reset password token generation, which uses a weak algorithm making it susceptible to brute-force attacks. Our journey from discovery to proof of concept highlights the need for robust security measures to protect user accounts.

Steps to Reproduce

  1. Initiate a Password Reset:
    — Request a password reset for target accounts to observe the structure of the reset password token. Identify the fixed and variable parts of the token.

2. Brute-Force the Token:
— Use Burp Suite to brute-force the reset token. Capture the password reset request and identify the token parameter.
— Manually set the first three digits to `001` and fuzz the remaining characters to generate numerous token combinations rapidly.
— We sent more than8,000 requests to successfully brute-force the token and reset the password for the target account.

For the full version of this writeup, please visit [Unlocking the Weak Spot: Exploiting Insecure Password Reset Tokens].

--

--

sallam
sallam

Responses (3)