How I Discovered an Account Takeover from a Reset Password Vulnerability

Dhiren Kumar Pradhan
3 min readSep 22, 2024

Vulnerabilities related to password management are both common and impactful. They offer a window of opportunity for attackers to hijack accounts and gain unauthorized access. Today, I’m going to walk you through one of my experiences where I identified an account takeover vulnerability through the reset password functionality.

Photo by Jakayla Toney on Unsplash

The Context

During a routine security assessment of a web application, I focused on testing the password reset feature — a crucial entry point that many attackers target. The aim was to ensure that users could securely reset their passwords without leaving the application exposed to potential exploits.

Initial Exploration: Reset Password Flow

Like many other applications, the password reset process involved the following steps:

  1. User submits their email for resetting the password.
  2. The system sends a reset password link to the provided email address.
  3. The user clicks on the link and is redirected to a page where they can set a new password.

The overall flow seemed straightforward, but there was one crucial point I wanted to dig deeper into — the reset password token.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in