[WRITE-UP] My first bug bounty write-up about my first valid finding | A very simple ATO bug in a target who wasn’t running any bug bounty program (Bounty: 40K INR)
Hi guys, I’m Shubham Bhamare from Maharashtra, India. It’s my first bug bounty write-up about my first valid bug which could have allowed a malicious user to take over any account on that target site.
So let's start! 👉
As I can’t disclose the name of the company, let’s call it “Target”. While using their website, I found that there should be something unintended.
But unfortunately, they weren’t running any bug bounty program. But due to the severity of this bug and the huge number of their users, I decided to contact them via email and ask them whether they’re running any bug bounty program or not. TBH, I just wanted to bring this issue to their attention, didn’t expect any reward from them. Just wanted to get this bug fixed as I also was a user of their service(s).
So on the next day, they replied that they're not running any bug bounty program currently but can give a bounty based on the severity of a bug.
So with their consent, I proceed further.
2 accounts of that target i.e. Attacker and Victim.
1) Target has a login option. Users can login with both by entering a password or OTP.
2) Assume that both attacker and victim have created their accounts on that target.
3) Now from the attacker's perspective, try to login to the victim's account with OTP by entering the victim's phone or username.
4) A 6-digit code will be sent to the victim.
5) After 60 seconds, click the 'Resend' button and capture the request.
6) Modify the "phone" parameter with the attacker's phone (where the attacker can receive messages).
7) Forward the request.
8) Now attacker will receive the OTP and after entering it, he'll successfully log in to the victim's account.
Here, target wasn't authenticating phone number while re-sending OTPs.
When the team fixed this issue, I found another similar vector that also could be abused.
It was asking OTP if the user requested to delete the account. So this endpoint was also vulnerable.
40K INR for both bugs.
1) Although the company doesn't have their bug bounty program and you believe that there's something unintended in their infrastructure that should be fixed, contact them for their consent to test it further. Because securing something from bad guys is always a good practice.
2) Don't hunt on that programs/features where everyone's hunting already. Find your own programs/hidden features/techniques.
3) Always try to find a bypass.