🔥 Account Takeover via Duplicate Registration — A 1500 Euro Jackpot
The Bug
Found a critical account takeover in a web application’s registration flow.
The platform allowed creating the same account (same email) from a different session, even though the account already existed.
Step-by-Step PoC
- Create account with email: xyz@account.com and place some orders.
- In a different session, re-register using the same email: xyz@account.com.
- ✅ Registration works again — no error for duplicate account.
- Now the attacker controls:
- The victim’s orders
- Can change the password
- Full account access = Total takeover.
Impact
- Complete account takeover
- Orders, personal data, everything exposed
- Victim locked out after attacker changes password
Status
- Accepted as High ✅
- Rewarded 1500 Euros 💰
Takeaway
Duplicate account creation = critical bug hiding in plain sight.
Sometimes basic checks (like preventing duplicate registrations) protect the entire platform.
Comments
Post a Comment