How I Bypassed 2 layers 2FA on a B2B Site, an Awesome experience šŸ˜

Shahariar Amin
4 min read5 days ago

--

A Tale of Response Manipulation and a Lesson in Server-Side Validation

As a bug bounty hunter, Iā€™m always on the hunt for vulnerabilities that could compromise user security or platform integrity. Recently, I uncovered a critical flaw on a B2B business site where users can create online stores to sell products. What began as a routine test turned into a shocking discovery: I could bypass both the email and phone OTP verification steps using a simple response manipulation technique, allowing me to create an account without proving ownership of either credential. Hereā€™s the story of how I found this vulnerability, reported it, and learned a valuable lesson about the importance of server-side validation.

Step 1: Exploring the Registration Flow

I started by navigating to the login page of the B2B business site, which offered options to sign in with Google or email . I chose ā€œSign in with Emailā€ and entered a random email address I didnā€™t own ā€” letā€™s say test@example.com. After submitting, I was prompted to enter an OTP sent to that email. Since I didnā€™t have access to the email, I entered a random OTP, 1111, and prepared to intercept the request using Burp Suite.

Step 2: Bypassing the Email OTP

With Burp Suiteā€™s intercept feature enabled, I clicked ā€œVerify OTP.ā€ A POST request to the /store/verify-email-otp endpoint appeared in the interface. I right-clicked the request, selected ā€œDo Intercept,ā€ and chose ā€œResponse to this Request.ā€ The server responded with a 400 Bad Request and a JSON payload: {ā€œerror_msgā€:ā€Invalid OTP. Please try again.ā€}. This was my chance.

I modified the response to a 200 OK status and changed the JSON to {ā€œredirectā€:ā€https:\/\/[REDACTED]\/store\/setupā€}. After turning the intercept back on and forwarding the request twice, the page redirected to the next step of the registration process. I had successfully bypassed the email OTP verification without knowing the correct code!

Step 3: Tackling the Phone OTP

The next page asked for my name, store name, and a phone number. I entered arbitrary data, including a Bangladeshi phone number +88017********, and clicked ā€œVerify Mobile.ā€ An OTP was supposedly sent to the phone number, and I was prompted to enter it. Again, I entered a random OTP, 1111, and intercepted the request.

The POST request went to the /store/verify-otp endpoint. I followed the same process: intercepted the response, which initially showed 400 Bad Request with {ā€œerror_msgā€:ā€Invalid OTP. Please try again.ā€}. I modified it to 200 OK and changed the JSON to {ā€œsuccessā€:ā€OTP verified successfullyā€}. After forwarding the request, the page confirmed the OTP verification.

Step 4: Completing the Registration

I was then prompted to select my user type (e.g., Creator, Business, etc.) and clicked ā€œContinue.ā€ To my surprise, I was redirected to the dashboard of a fully functional store. I had created an account on the B2B business site without access to the email or phone number ā€” a critical authentication bypass vulnerability!

The Impact: Why This Matters

This vulnerability allows attackers to create accounts using any email and phone number without verifying ownership, potentially leading to account takeovers if linked to existing users. Attackers could impersonate legitimate sellers, list fraudulent products, or abuse platform features like financial transactions and customer data access. By bypassing both OTPs, the flaw critically undermines the platformā€™s trust and security, exposing it to significant risks.

The Lesson: Server-Side Validation Is Non-Negotiable

This experience reinforced a critical lesson in cybersecurity: never trust client-side data. The B2B business siteā€™s reliance on client-side response handling allowed me to bypass two layers of authentication with minimal effort. Proper server-side validation would have ensured that only legitimate OTPs could proceed, preventing this vulnerability entirely.

Final Thoughts

Bug hunting is a thrilling journey of discovery, and finding a critical vulnerability like this is both rewarding and humbling. Itā€™s a reminder of how even small oversights can lead to significant security risks, especially on platforms handling sensitive business operations.

#Happy_Hunting

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Shahariar Amin
Shahariar Amin

Written by Shahariar Amin

Penetration Tester (Web Application),Bug Hunter,CSE student of RUET,Bangladesh.

Responses (1)

Write a response