How I Found a Critical Password Reset Bug in the BB program(... #1399
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
The post details a pre-authentication account-takeover caused by a registration endpoint that doubles as a password reset without ownership verification. The researcher proxied the Android app through Burp Suite (guide), extracted API paths from bundled JavaScript to build a custom wordlist, and fuzzed with FFUF to enumerate hidden actions. This process rev...
🔧 Technical Details
Endpoint harvesting + fuzzing: Extract API paths from client code (e.g., bundled JavaScript) to build a custom wordlist, then fuzz
/base/path/FUZZ
to discover hidden handlers. Use server feedback (e.g., “Only POST request is allowed.”) to infer required methods and parameters, then iterate with correct verbs and headers.Registration-as-reset abuse: When registration handlers upsert on existing emails, submit
{"email": "[email protected]", "password": "New@123"}
to overwrite credentials without a reset token. This exploits missing uniqueness checks and absent ownership verification, yielding immediate ATO. Mitigate by rejecting existing emails on signup and requiring tokenized, verified flows for password changes.🤖 Agent Actions
I analyzed the blog and HackTricks structure and found the best-fit locations to add this technique are:
What I added
Why these locations
Changes performed
Both files now include the “Registration-as-Reset (Upsert on Existing Email)” technique with reproduction steps, PoC, and mitigation, and both reference the blog.
No other updates were necessary since endpoint harvesting and ffuf usage are already well-covered in the Web Methodology.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup