“The Registration Flaw That Almost Got Missed: Hunting Weak Authentication Links”
文章指出某些应用通过HTTP而非HTTPS发送验证或重置链接,导致敏感令牌暴露在不安全的网络环境中。攻击者可借此劫持用户账户。尽管登录页面使用HTTPS看似安全,但邮件中的HTTP链接却成为关键漏洞。 2025-9-26 05:1:52 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

Aman Sharma

I was about to close the tab when I noticed it. The password reset email from the fintech startup used http:// instead of https://. At first glance, it seemed minor—until I realized the reset token in that insecure link was all an attacker needed to take over any account. This "low-severity" find turned into a critical demonstration of how authentication systems fail at the most basic level.

free link

Press enter or click to view image in full size

When HTTPS Becomes Optional: The Verification Link Problem

Many developers assume that because the login page uses HTTPS, their entire application is secure. But the emails they send tell a different story.

The Real-World Impact:
On a popular productivity app, I found that account verification links were sent over HTTP. The sequence went like this:

  1. User registers at https://app.com/signup
  2. App sends verification email with link: http://app.com/verify?token=abc123
  3. User clicks link and gets automatically logged in

The vulnerability? Anyone intercepting that email (on public Wi-Fi, compromised email account, or malicious ISP) could capture the token and hijack the account…


文章来源: https://infosecwriteups.com/the-registration-flaw-that-almost-got-missed-hunting-weak-authentication-links-75337daa6bf9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh