Bypassing HackerOne 2FA due to race condition
Summary by HackerOne
A race condition vulnerability was identified in HackerOne's 2FA reset process. The issue allowed an attacker to initiate multiple parallel 2FA reset requests, resulting in multiple reset notification emails. When a user canceled one reset request, the remaining requests would stay active, potentially leading to unauthorized 2FA removal after 24 hours.
Timeline
submitted a report to HackerOne.
July 12, 2024, 9:25am UTC posted a comment.
Updated October 30, 2024, 2:32pm UTC posted a comment.
Updated July 12, 2024, 9:25pm UTC posted a comment.
July 18, 2024, 2:47am UTC HackerOne triage
changed the status to Pending program review
. HackerOne staff
updated the severity to medium (4.8)
. HackerOne staff
changed the status to Triaged. HackerOne staff
posted a comment. posted a comment.
July 25, 2024, 12:30pm UTC posted a comment.
July 31, 2024, 12:59pm UTC HackerOne triage
posted a comment. rewarded akashhamal0x01 with a bounty.
August 2, 2024, 8:55am UTC HackerOne staff
changed the status to Retesting. completed a retest.
Updated October 30, 2024, 2:32pm UTC posted a comment.
October 29, 2024, 8:29pm UTC HackerOne staff
changed the report title. accepted completed retest from the retester.
October 30, 2024, 2:21pm UTC HackerOne staff
closed the report and changed the status to Resolved. posted a comment.
October 30, 2024, 2:23pm UTC HackerOne staff
requested to disclose this report. agreed to disclose this report.
October 30, 2024, 2:56pm UTC This report has been disclosed.
October 30, 2024, 2:56pm UTC posted a comment.
October 31, 2024, 10:34am UTC posted a comment.
December 14, 2024, 7:24am UTC HackerOne staff
posted a comment. posted a comment.
February 23, 2025, 9:58am UTC