Follow me on

Twitter: Scalar360

A simple Account takeover misusing JWT late expiration

Hey Guys,

This is my first write-up hope you all like this.

Wrote this because there is a good story to tell and currently getting bored.

The program not allow me to disclose any kind of information so, I am not disclosing name here but may be you will get it, If you hunted that one ; )

I tried my best to make  write-up less complicated because I am bounded by non-disclosure policy.

I started hunting this program from 5th of feb but before that I would like to paint the situation. I was too busy in college works so, was not able to give proper time to bug bounty,  was frustrated, got 4 duplicates and 2-3 bugs with low bounty. The month was not going well, for the change I started reading blogs about new techniques, mind set of approach and new methods of bug bounty. Collected all small points and started again.

Selected this program hunted for 1 week and got 3 P4 and 1 P3  they don't give bounties  for P4 even they gave me bounties for P4 and I will say thanks for their positive attitude but that can't  pay my bad month. 

The program is built for users to monitor their AWS and the program is built by using AWS  so, eventually I was testing Amazon 不不不.

I loosed my  all hope because I was testing this program from 16-17 days and got nothing good  but the magic happened and I got a JWT issue and report it as soon a I can but the program found it as acceptable business issue. The issue was the JWT was not expiring till 15 minuets. So, after a admin is removed from the projects even he/she can make admin actions in project because the  JWT do not expires immediately.  

After this all happened they give it won't fix tag and closed it, after that I decided  this is the last night (when I found AC takeover) I am hunting this program and don't know why I started reading the report again and started  summarising the whole situation going and going and going... vallah...! a idea bangs in my mind that how I can make this issue to Full account takeover.


A assigned admin can be default admin even his/she is force fully remove from project by default admin, because application takes 15 min to destroy assigned admin's session as admin.If assigned admin is logged out then he/she can't do anything but if assigned admin is logged in during default admin removes him/her so, removed assigned admin can be default admin by following steps.

(there is so much admin admin in above sentence不.)

First I created 2 AC one default admin and one invited by default admin as 2nd admin.

Vulnerability chain:

1) JWT takes 15 minuets to expire.

2) Application accepts that removed admin can send invitation again to email which is removed by default admin even attacker(removed admin) has no privilege to send invitation as he/she is removed as admin.
(keep in mind this is happening because of JWT take 15 minuets to expire so, removed admin misuse to send invitation to own self and application accept it also.)

3) As main action- Removed assigned admin send invitation to own self, till JWT expires. 


Admin 1 ---- jon  --> default admin 
Admin 2 ---- Tyrion --> assigned by jon

 1) Tyrion violate some rules so, jon remove Tyrion from project but if Tyrion is logged in during jon remove him, Tyrion's session will take 15 min to expire as admin.

2)As any user get removed from project he/she gets a email that he/she is removed from project.

3) As Tyrion will notify that he is removed from program, He will send invitation to own self on which e-mail he got removed by jon.  

4) Tyrion will remove Jon from project and will become one and only default admin because now no one can remove Tyrion as admin because only admin can remove admin and Tyrion is only admin in project.

The key point:
 Removed admin get again full fledged admin access and his session is also restored. JWT take 15 min to expire but attacker restore it in 4 min and again have a true JWT. 

They do not accepted my 1st report because there was Vulnerability "but" no exploitation. I was not able to use JWT in a exploiting way but lateral thinking helps a lot in making vulnerability exploitable.

I was able to hold my patients because I read a blog in which  a guy spend 2+ weeks on a simple CSRF and make it a complex AC takeover and second reason  this

Till this date I learnt 4 principles of Bug Bounty:

1) Give at least 1 day for recon and 2 weeks for finding to a program.

2)Never loose hope and think, that I will end up with Chaos.

3) Never get excited and report a small bug after finding it, think how can you make it better.
(As you can see in this case I reported a JWT expiring issue and after lateral thinking on that I end up with a AC takeover.)

4) Learning is more important than continuous hunting and running for money.  


1) At night reported Vulnerability.

2) After 5 hours of reporting received bounty as P1 at morning. 不




  1. Sometimes, the splurge is value it, particularly, phrases of|in relation to} high-quality and luxurious products. So, if you’ve obtained someone in your life with champagne style, then look no further for steering on how to to|tips on how to} wow them this vacation season. All slots are based mostly on one key thought – spin the reels and hope they land on a certain mixture. This makes understanding slot games incredibly easy for a beginner, as once you perceive how one performs 儦渥賄科渣 out, you realize the fundamentals behind all of them.


Post a Comment

Popular Posts