A7:2021 | Password Reset (6) | Cycubix Docs
Last updated
Last updated
When creating a password reset link you need to make sure:
It is a unique link with a random token
It can only be used once
The link is only valid for a limited amount of time.
Sending a link with a random token means an attacker cannot start a simple DOS attack to your website by starting to block users. The link should not be usable more than once which makes it impossible to change the password again. The time out is necessary to restrict the attack window, having a link opens up a lot of possibilities for the attacker.
Try to reset the password of Tom (tom@webgoat-cloud.org) to your own choice and login as Tom with that password. Note: it is not possible to use OWASP ZAP for this lesson, also browsers might not work, command line tools like curl
and the like will be more successful for this attack.
Tom always resets his password immediately after receiving the email with the link.
Solution
Hints: Try to send a password reset link to your own account at {user}@webgoat.org, you can read this e-mail in WebWolf. Look at the link, can you think how the server creates this link?. Tom clicks all the links he receives in his mailbox, you can use the landing page in WebWolf to get the reset link...The link points to localhost:8080/PasswordReset/.... can you change the host to localhost:9090?. Intercept the request and change the host header. For intercepting the request you have to use a proxy.
Troubleshooting: Check the HTTP-Proxies Lesson in the general category if you're unfamiliar with using proxies. Important: There seem to be problems when modifying the request header with ZAP. We recommend to use Burp instead.
Go ahead and send to WebWolf a request of forgot password.
Analyze the response and the link created:
This is the URL for the linkto reset the password: http://localhost:8080/WebGoat/PasswordReset/reset/reset-password/b7517641-02ee-4e9f-8594-085b2e07a91d
Turn on the interceptor iun BurpSuite. Then submit the reset password request for Tom's emails.
Identify the POST request and send it to the repeater. Change the Host to localhost:9090 (WebWolf). Click send and examine the answer.
As you can see the password reset says that an email was sent to tom@webgoat-cloud.org, but we will intercept that message. For the WebGoat server the request has been sent to Tom.
Go into WebWolf and see the captured request (don't forget to turn off the Interceptor). You should see and url .../resetpassword. Copy the path, and go to the link that was provided in the initial password reset sent to WebWolf emails.
Paste the path in the url address, adding the host name: http://localhost:8080/WebGoat.
Enter the password in the session in WebGoat.