Bypassing 2FA to Impersonate Users on Drugs.com | Bug Bounty

 


Introduction

Hey Security Enthusiasts!
A serious authentication flaw was recently discovered on Drugs.com, allowing attackers to bypass Two-Factor Authentication (2FA) and impersonate legitimate users. This vulnerability exposed user accounts to takeover risks due to improper session handling and weak email verification.

What Happened?

During security testing, researcher (duk3_) found that Drugs.com did not properly verify email ownership during account changes. This enabled an attacker to hijack accounts without requiring 2FA re-authentication.

Steps to ReproduceRegister an Account:

  1. Register an Account
Attacker Email
  • Sign up on Drugs.com with an attacker-controlled email.
  • Complete OTP verification and select “Trust this device for 1 month.”

2. Change Email to Victim’s Email

  • Navigate to Account Details.
  • Change the registered email to the victim’s email.
  • Since the attacker’s session remains active, they retain control of the account.
Changing Email To Victim

3. Bypass 2FA

  • Log out and log back in — 2FA is no longer required.
  • Cycle between the attacker’s and victim’s email to maintain persistent access.

4. Impact on Victim

  • The victim is locked out when attempting to register, as their email is “already in use.”
  • The attacker continues to impersonate them without detection.
Email already used

Report Details

Reported to: Drugs.com
Report ID: #2885636
Severity: High (7.5)
Weakness:Improper Authentication — Generic

Final Thoughts

Thanks to duk3_ for discovering this vulnerability and earning well-deserved recognition in the Security Hall of Fame. Kudos to him for responsible disclosure!Stay secure and happy hacking! 🚀🔐

Comments

Popular Posts