Unused password reset token not expring

Disclosed by
bl4ckh4t_bugcrowd
  • Engagement Dropbox
  • Disclosed date about 1 year ago
  • Priority P5 Bugcrowd's VRT priority rating
  • Status Informational This vulnerability is seen as an accepted business risk
Summary by Dropbox

This report demonstrated the intended outcome when requesting a password reset link. No action is needed to protect users. The report was closed due to lack of impact.

Summary by bl4ckh4t_bugcrowd

The password reset implementation needs to involve a unique, temporary high-entropy token that has a short expiry and can only be used once. When these conditions are not met, the password reset implementation is considered weak. This diminishes the strength of the overall authentication process for the application and can lead to account takeover.

The application does not invalidate the password reset token after its use. If an attacker were to gain access to the system used to store the reset token, or the email of the user, they could reset the users password again.

Business Impact

Weak password reset implementation can result in reputational damage for the business through the impact to customers’ trust as they could believe that the business doesn’t take their account security seriously or trust that their data within will remain secure.

If an attacker successfully takes over an account by capturing a password reset token, it can lead to data theft from the business. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by the application, as well as the level of access gained by an attacker.

Steps to Reproduce

Use a browser to login and navigate to: {{URL}}
Initiate a password reset
Utilize the password reset token received to reset the password
Observe that the password reset token received earlier is still valid after being used

Activity