Open event server is vulnerable to email verification bypass. Attackers can arbitrarily register any email address as account with verified status.
-
Attacker first registers an account with their own email address and verify it
-
Attacker create a group with an arbitrary name image
-
Attacker invite an email-to-compromise, say
admin@jhu.edu, to this just created group. image -
Attacker can get invitation token from the http response image
-
Attacker create an account with email
admin@jhu.eduwith unverified status image image -
Attacker crafts and accesses invitation accept link with the token:
http://proof-of-concept:4200/group-invites?token=44556328039204036848740965298508996364, then we can see the email successfully verified. image
Developer assumes that the invitation link is clicked through invitee's email inbox, thus can be considered a email verification process. However, the token can also be obtained from the inviter. The logic flaw leads to email verification bypass.