How I made 2000$ using Flickr Account Takeover Bug!

Flickr Account Takeover

📢 Overview of the Flickr Account Takeover Vulnerability

A major security flaw in Flickr’s authentication system exposed Flickr Account Takeover Vulnerability. Security researcher Lauritz Holtmann discovered that Flickr’s integration with Amazon Cognito API had serious misconfigurations that allowed attackers to hijack accounts without needing a password.

In this blog, we’ll break down the vulnerability, how it was exploited, and what Flickr did to fix it.


🔍 How the Vulnerability Worked

The issue originated from Flickr’s OAuth-based login system, which relied on Amazon Cognito for authentication. The misconfiguration allowed attackers to bypass security checks and gain access to user accounts.

Flickr Account Takeover
Flickr’s OAuth-based login system

Here’s what went wrong:

1️⃣ Improperly Configured Identity Pools: Cognito was set up incorrectly, allowing unauthorized access to session tokens.
2️⃣ ID Token Manipulation: Attackers could obtain a valid identity token for one account and use it to access another user’s account.
3️⃣ Lack of Proper Validation: Flickr failed to verify that the Cognito-issued tokens actually belonged to the requesting user.

As a result, an attacker could generate a valid session token for any Flickr account, effectively bypassing the password login process.


⚠️ How Hackers Could Exploit This Flaw

An attacker could take over any Flickr account in three simple steps:

1️⃣ Obtain a valid Cognito ID token (either from their own account or by intercepting one).
2️⃣ Modify the token to impersonate another user’s account.
3️⃣ Use the modified token to log in as the victim—without needing their password.

Flickr POC Account Takeover

Once inside, the hacker had full control. They could:
–> Steal private photos and messages
✔️ Lock out the real user by changing login credentials
✔️ Use the account for phishing or spam attacks

This type of vulnerability is critical because it completely bypasses traditional security measures like passwords and multi-factor authentication (MFA).


🛡️ How Flickr Fixed Flickr Account Takeover Vulnerability

After the vulnerability was reported, Flickr worked with Amazon to patch the flaw and secure its authentication system.

–> Fixed Identity Pool Permissions: Restricted token usage to only the intended accounts.
✔️ Implemented Strict Token Validation: Ensured that Cognito ID tokens match the logged-in user.
✔️ Enhanced OAuth Security: Added extra checks to prevent unauthorized account access.

These updates closed the loophole and prevented attackers from exploiting Cognito’s authentication tokens.


🚀 Lessons for Users and Developers

💡 For Users:

  • Monitor your account activity regularly for unusual logins.
  • Use unique passwords and enable 2FA where possible.
  • Be cautious of phishing emails that may exploit authentication vulnerabilities.

💡 For Developers:

ghibli art
Lessons for Users and Developers #ghibli art
  • Always validate authentication tokens to prevent impersonation attacks.
  • Configure Amazon Cognito identity pools securely to avoid unauthorized access.
  • Use server-side validation instead of relying solely on client-side authentication.

🔥 Final Thoughts

This vulnerability highlights the critical importance of proper authentication security. Even large platforms like Flickr can fall victim to misconfigurations that expose user accounts to takeovers.

You can read about it from the Author himself here

With more services relying on third-party authentication, it’s crucial to audit security settings regularly to prevent similar flaws.

You can read my previous blog on “ Next.JS 9.1 CVSS Vulnerability

💡 What are your thoughts on this vulnerability? Have you ever encountered authentication issues like this? Drop your comments below! 🚀

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *