Unauthenticated Password Reset Abuse
target.com存在严重漏洞,允许攻击者无需认证删除用户密码。结合用户枚举和XSS漏洞,可能导致大规模账户接管。核心问题在于密码重置流程中的验证码机制缺乏有效速率限制。 2025-7-15 11:10:57 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

Hello fellow researchers and security professionals,

Today, I’d like to walk you through a serious vulnerability I discovered on target.com that allowed an attacker to unauthenticatedly remove user passwords at scale. This issue, when combined with other common bugs like user enumeration and XSS, could lead to automated account takeovers affecting a large number of users.

Let’s break down the findings, starting with the core issue: Captcha enforcement and its weaknesses.

Captcha is typically used to prevent bots and automated attacks. In a secure implementation, it acts as a barrier that limits how often a particular action — like a password reset — can be attempted.

However, in this case, the captcha mechanism implemented in the password reset flow on target.com lacked effective rate limiting. This meant an attacker could continuously send password reset requests using different email addresses without ever getting blocked or throttled. Essentially, the captcha became a checkbox with no real defense power, especially when brute-forced or automated.


文章来源: https://infosecwriteups.com/unauthenticated-password-reset-abuse-ad2375b358f5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh