step 1: Attacker Enter the victim's email or mobile number into the forgot password field.
step 2: Attacker intercept the request and got JSON data like that
{“email”:”victim@gmail.com”,”token”:”1234"}
step 3: Attacker change victim email to his email id
{“email”:”attacker@gmail.com”,”token”:”1234"}
and forward the request.
*Notice on the old token is deactivated or not.
Impact It allows the person who has control of particular site to change the user’s password (CSRF attack), because this person knows reset password token of the user.