Post

PortSwigger - Authentication - Lab 11

Lab 11 - Password reset poisoning via middleware

Lab Objective:

This lab is vulnerable to password reset poisoning. The user carlos will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos’s account. You can log in to your own account using the following credentials: wiener:peter. Any emails sent to this account can be read via the email client on the exploit server

Reference:
Port Swigger - Lab 11

Solution


2. Send the POST /forgot-password request to Burp Repeater. Notice that the X-Forwarded-Host header is supported and you can use it to point the dynamically generated reset link to an arbitrary domain.

3. Go to the exploit server and make a note of your exploit server URL.

4. Go back to the request in Burp Repeater and add the X-Forwarded-Host header with your exploit server URL: Don't include Http/Https X-Forwarded-Host: YOUR-EXPLOIT-SERVER-ID.exploit-server.net

5. Change the username parameter to carlos and send the request.

6. Go to the exploit server and open the access log. You should see a GET /forgot-password request, which contains the victim’s token as a query parameter. Make a note of this token.

8. Load this URL and set a new password for Carlos’s account.

9. Log in to Carlos’s account using the new password to solve the lab.


This post is licensed under CC BY 4.0 by the author.