How the use of hidden form fields lead to Email verification bypass

Overview

Exploitation

  1. example_user_profile[email]
  2. example_user_profile[_token]

Mitigation

--

--

--

A Cybersecurity Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The magic of Recursion and why you should be using it in your code

Zairp Review 2022- Is It Really Worth Buying - Customer Reviews

CRODO VS Ticket Finance: Battle Of Launchpads

My Android Diary

AWS Redshift and Creating Test Data Infrastructure

Build your own Multi-Node Kubernetes cluster with Monitoring

ASP.NET Core MVC Fundamentals

Intro to GraphQL

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Yash Swarup

Yash Swarup

A Cybersecurity Enthusiast

More from Medium

Bug Alert —Critical Vulnerability Alerting System

Attacking IBM MQ — SWIFT to Steal Money$$$

Easy Understanding of Owasp Top 10-2021

Bug Bounty Methodology — Bug Hunting Checklist(PART-2)