Forgot Password
Forgot Password Functionality
Introduction
Some common bugs in the forgot password / reset password functionality
How to exploit
Parameter pollution
Bruteforce the OTP code
Host header Injection
to
And the victim will receive the reset link with evil.com
Using separator in value of the parameter
No domain in value of the paramter
No TLD in value of the parameter
Using carbon copy
If there is JSON data in body requests, add comma
Find out how the tokens generate
Generated based on TimeStamp
Generated based on the ID of the user
Generated based on the email of the user
Generated based on the name of the user
Try Cross-Site Scripting (XSS) in the form
Sometimes the email is reflected in the forgot password page, try to use XSS payload
References
Last updated