This vulnerability occurs when an application's password reset or recovery feature is poorly designed or implemented, allowing attackers to bypass authentication and hijack user accounts.
Password recovery is a necessary feature, but it often becomes the weakest link in your authentication system. Common flaws include using easily guessed security questions (answers found on social media), sending the original password instead of a secure temporary one, or failing to limit reset attempts, which enables denial-of-service attacks. Attackers exploit these oversights to impersonate legitimate users, completely undermining even strong initial password policies. To prevent this, treat the recovery mechanism with the same security rigor as the primary login. Always generate a time-limited, single-use token sent to a pre-verified contact method. Implement robust rate-limiting and audit logs for all recovery attempts. The goal is to verify the user's identity securely without creating a new, exploitable path into the account.
Impact: Gain Privileges or Assume Identity
An attacker could gain unauthorized access to the system by retrieving legitimate user's authentication credentials.
Impact: DoS: Resource Consumption (Other)
An attacker could deny service to legitimate system users by launching a brute force attack on the password recovery mechanism using user ids of legitimate users.
Impact: Other
The system's security functionality is turned against the system by the attacker.
High