$280 Bug Bounty: How a Case-Sensitive Email Bug Locked Users' Accounts
Vine Android应用存在逻辑漏洞,允许攻击者通过利用邮箱地址的大小写差异覆盖用户账户,导致用户被永久锁定。该漏洞因注册流程中对邮箱地址的大小写敏感处理引起。 2026-1-4 06:32:57 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

Overwriting Accounts via Android Signup Logic Flaw

Monika sharma

Press enter or click to view image in full size

Introduction

While reviewing an old Vine bug bounty report, I found an interesting issue that had nothing to do with stolen sessions or leaked tokens. A simple logic flaw in the Android signup flow allowed an attacker to abuse email case sensitivity and lock users out of their own accounts. I decided to write about this report because bugs like this still exist today, and with the right approach, even beginners can find similar issues and earn their first bug bounty.

Vulnerability Overview

  • Platform: Vine Android Application
  • Vulnerability Type: Account overwrite / Denial of account access
  • Root Cause: Case-sensitive email handling during signup
  • Impact: Victim permanently locked out of original account
  • Bounty Paid: $280
  • Report ID: #187714

Understanding the Root Cause

Email addresses are generally treated as case-insensitive.

For example:


文章来源: https://infosecwriteups.com/280-bug-bounty-how-a-case-sensitive-email-bug-locked-users-accounts-175fe00779d9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh