My First Bounty on a Simple Bug

Prajit Sindhkar
2 min readJun 7, 2021


Hello Folks 👋 , in this write-up I will tell you how I ended up getting a 150$ bounty on a Bugcrowd Program.

My name is Prajit Sindhkar and I am a security researcher from India since a bit more than a year. I am also under Bugcrowd Top 500 Hacker and Bug Bounty Leader of the BUG XS Community. So we have also been teaching newcomers in this field via the BUG XS batches for bug bounty.

So , since I am not much of a writer, I haven’t really written about my findings in medium, but recently I was motivated to do so by many of my students, so I decided , why not start sharing from my first bounty.

I have found many interesting bugs since last one year , and now I will be writing a writeup on each one of them one by one from the start, so be sure to follow to get updates about my upcoming write-ups.😊

The bug name which I found was “Password Reset Link Not Expired After Use”. This comes under the VRT of “Insufficient Security Configurability >Weak Reset Password Implementation > Token Not Invalidated After Use

Steps To Find This Bug:

  1. Go to password reset page.
  2. Enter your email, and ask for a password reset link.
  3. Now go to mail and open that link in two tabs.
  4. Reset the password from one tab, reload the other tab , and if it let’s you reset password again then it is vulnerable to token not invalidated after use as we are resetting the password two times with same token.

Impact/Exploit Scenario: If victim’s email account is still logged into his/her Office Computers or any public Internet Café. Then any external attacker can use the used token to reset victims password.

Severity: Now due to this difficult to happen exploit scenario , which requires user interaction it is given as a P4 bug under Bugcrowd VRT.

Now this feature can be also used to sometimes chain it with other vulnerabilities, to get higher severity depending on the functionalities present in the website.


Submitted: 13 Apr, 2020

Accepted: 14 Apr, 2020

Resolved: 15 Apr, 2020

So this is all about this write-up, this was my first write-up so do suggest any changes I should make. Thanks for reading 😊👋

Profile Links:




BUG XS Official Website:



Prajit Sindhkar

I am a India Based Security Researcher, Bugcrowd Top 500 Hacker and Bug Bounty Leader of the BUGXS Community

Recommended from Medium


See more recommendations