Writeup: Password reset poisoning via middleware

Lan link.

The lab description says it is vulnerable to a password reset poisoning vulnerability. At first, we reset the password of the wiener user to understand the system structure.

Specifying username in the POST /forgot-password request is enough to request a password, if we can manipulate this request with X-Forwarded-Host, the email for username will go to our exploit server

If we look at the access log, we see that we get the value “temp-forgot-password-token=” and if we put this value in the token value in the URL, we reset the password of the user carlos.

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir