Removing request parameter to Bypass OTP verification

SRLSEC 🇮🇳
3 min readSep 19, 2021

Hello everyone, This is my fifth blog regarding Bug hunting. If you want to read my previous four blogs regarding my findings click on the following link.

Today, I am going to talk about OTP Verification Bypass that I found on E-commerce website. I started testing with technical vulnerabilities like XSS and SQL Injection but no Issues were found.

During the testing process, I have found five bugs.

  • Weak Password Policy at Password Change
  • No Rate Limit on forgot password leading to massive Email flooding
  • Email Enumeration via Password Reset
  • Mobile number Enumeration via User Signup
  • Missing Sessions Invalidation after Password Reset

But these are not critical findings. Then I tried looking for Business Logic vulnerabilities and fortunately, the target was vulnerable to OTP Verification Bypass.

Bypass OTP verification in account registration process

  1. Make a request to https://target.com/profiles-add/ and enter a username, mail, password, and mobile number (+910000000000) and click on Register.

2. Then enter a random 6 digit OTP (000000) and click on verify. Then capture the request in burp-suite.

3. Remove the result_ids parameter with value and forward it to the server.

4. Now profile created and mobile number verified without OTP

Impact

An attacker can able to create a profile with any mobile number also creates multiple profiles by using the same mobile number.

HOPE YOU LIKE IT : )

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

SRLSEC 🇮🇳
SRLSEC 🇮🇳

No responses yet

Write a response