Explore the story of a $1120 Twitter bug, I found — a security flaw that allowed attackers to seize full control of accounts without knowing the password.
Everyone who is reading this,I think aware of twitter. A couple of months after starting my bug bounty career, I found this bug in Oct. 2020. This bug is about, How an attacker was able to delete phone number and add this number, change password and full control over a account which they had partial access via sessions hijacking or cookie grabbing.
The Twitter Flow
Imagine you’re using Twitter, and suddenly, a hacker hijacks your session. It’s a scary scenario. But Twitter has implemented an extra layer of protection. When trying to make significant changes, like altering your phone number or disabling two-factor authentication (2FA), the hacker would typically be prompted to enter your account password. This would pose a challenge because they don’t have your password. However, there’s a twist to this story.
The Flaws
I discovered a some flaws that enables a hacker with a hijacked session to bypass the password screen. This means that even though they don’t know your password, they could still make changes to your Twitter account.
Here’s how this vulnerability plays out:
So Now we are half way done Now the Phone Number is deleted and the 2FA is disable now i have to find a way to add phone number without password.
I found a curios URL’s which allow me to bypass the password screen to add the phone number through 2FA enabling process.
Now you would be curious how it become the ATO.
So lets move to our final step.
The Bounty Reward:
Discovering a security vulnerability is one thing, but the true value lies in responsible disclosure and collaboration. Twitter, recognizing the significance of this security concern, acknowledged my findings.Twitter awarded a bounty of $1120 as a token of appreciation.
Takeaway
The takeaways from this article are to understand the flow of an application, then find a flaw figure out how to exploit those flaws in order to perform a task that requires authentication. It demonstrates that by understanding these flaws and their potential manipulations, one can gain valuable insights into bypassing security measures.
Leave some clap if you enjoyed this read, leave your feedback in comment and consider following me for more exciting findings.
Find me on Twitter: @a13h1_
Keep Supporting, Keep Clapping, Keep Commenting.