Attacker Can Takeover Any Account Because of Misconfiguration of Invite Members (Bug-Bounty)

Mayank Gandhi
System Weakness
Published in
3 min readMar 1, 2023

--

Hello Cybersecurity Researchers,

I am back again with an amazing writeup for you all, So you all know me if not then let me introduce myself :

My Name is Mayank Gandhi Founder & CEO of TMG Security .

I know I am Posting this After a long Time So sorry for that.

Before Going to Start the Article I have a Surprise for you all. Just wait till end ;)

Let’s Get Started

In this writeup, we will see a Logical Flaw that “ How An Attacker Can Take Advantage of Invite User’s Functionality and Perform Pre Account Takeover” And this article is specially dedicated for those who are facing some issues to find business logic vulnerabilities. So, Don't Worry I am here 😉

As You all know that I write articles in very short and easy way So let’s See.

let’s consider the target as redacted.com. I visit such redacted.com and i see there is “INVITE USER’S FUNCTIONALITY”

Invitation User’s Functionality

From Where I can Invite any User. Now Here the Attack Begins..

  • Let Suppose (VICTIM MAIL) — testxxx@gmail.com
  • Attacker can send invite to victim mail testxxx@gmail.com
  • Victim don’t have account on redacted.com
  • So Obviously Victim will get the Invitation Mail in their INBOX
  • But Don’t Click On that Invitation Link.
  • Victim Direct Go to redacted.com
  • Try To Create an fresh account with testxxx@gmail.com
  • And Then the Game Begins..
  • Website will Throw the error That “EMAIL ALREADY IN USE”
“Website Throw this error”
  • (IMPACT) Now attacker can do this attack on lot of users so users can’t even signup or login in the redacted.com

How’s It ? It’s Good Right ? If you like this Then Don’t Forget to Do comment and Clap on the article.

Now Let’s Revealed the Surprise..

TMG Security (tmgsec.com) have successfully launched ADVANCED BUG BOUNTY HUNTING V1.0 ,its a live training program starting from 10th march 2023 ,you can checkout the provided link and description is provided in the website.

Course contains amazing content like this article and more with chaining vulnerabilities impacting to full account takeover and many more… as shown in attached image.

This is just a trailer of the course content 🤑.

Advanced bug bounty v1.0: https://courses.tmgsec.com/courses/advance-bug-bounty-hunting-v1-0/

course syllabus

For other Interesting courses(Web/API/Android) checkout website link:https://courses.tmgsec.com/courses

For further queries you can reach out at: support@tmgsec.com

Hope you like the content, thanks for reading.

FOLLOW ME ON OTHER PLATFORMS IF U LIKE THIS BLOG !!!

Subscribe to TMG Security YouTube channel for Cybersecurity related stuff : https://www.youtube.com/channel/UCh69B2L9ThUmSBN6a_1ul5Q

Follow me on Instagram mr.mayankk_

Follow me on LinkedIn : https://www.linkedin.com/in/mayank-gandhi-b85725232/

--

--

Founder & CEO at TMG Security || Cybersecurity Professional || Application Security || DevSecOps || Bug Bounty Hunter || VAPT || SecOps || SIEM || CyberSecurity