|
64 | Insecure Account Deletion | Closed | 22.07.2024 |
Task Description
Summary: The removal of account is one of the sensitive part of a web application that needs to protect, therefore removing an account should validate the authenticity of the user, however i have found that when removing an account, the system did not require the user to input the account password. Steps To Reproduce: 1.Create an account on https://alwaysdata.com 2.Go to My account section DELETE ACCOUNT. 3.Click on delete and you will see it will delete the account without any kind of verification or password confirmation.
Impact Exploit Scenario: The user logins to a shared computer (office, library, cafe) Left the account open. Intruder came and try to delete the users account Intruder can easily delete the account because the system did not protect it by asking the password to validate that the person deleting the account is the real user.
Regards Raghav Sharma
POC Link -: https://drive.google.com/file/d/1iu1gb0l44_sTqG2Ol-ZTbLc0ZKHYkO-f/view?usp=drive_link
|
|
63 | Stored XSS Via Upload Document | Closed | 17.07.2024 |
Task Description
Vulnerability Explanation-When a user uploads a document containing malicious code, such as JavaScript, to the web application, it gets stored on the server without proper validation or sanitization. This allows an attacker to inject and execute arbitrary scripts within the application's context.
Impact-This vulnerability enables attackers to execute unauthorized scripts on the client-side, leading to session hijacking, data theft, or defacement of the web application. It can compromise user privacy, damage the application's reputation, and potentially expose sensitive information to malicious actors.
Severity-High
Steps to reproduce- 1) go to support https://admin.alwaysdata.com/support/
2) Open new ticket
3) upload this code as a.pdf (%PDF-1.3
%���� 1 0 obj «/Pages 2 0 R /Type /Catalog» endobj 2 0 obj «/Count 1 /Kids [3 0 R] /Type /Pages» endobj 3 0 obj «/AA
<</O
<</JS
(
try {
app.alert\("xss"\)
} catch \(e\) {
app.alert\(e.message\);
}
)
/S /JavaScript>>>>
/Annots [] /Contents 4 0 R /MediaBox [0 0 612 792] /Parent 2 0 R
/Resources
<</Font <</F1 <</BaseFont /Helvetica /Subtype /Type1 /Type /Font>>>>>>
/Type /Page>>
endobj 4 0 obj «/Length 21» stream BT /F1 24 Tf ET
endstream endobj xref 0 5 0000000000 65535 f 0000000015 00000 n 0000000062 00000 n 0000000117 00000 n 0000000424 00000 n trailer
«/Root 1 0 R /Size 5» startxref 493 %%EOF)
4) upload this file 5)Open this ticket 6) click on ulpaded malicious pdf file it will refelct
|
|
62 | Stored XSS Via Upload Document | Closed | 17.07.2024 |
Task Description
Vulnerability Explanation-When a user uploads a document containing malicious code, such as JavaScript, to the web application, it gets stored on the server without proper validation or sanitization. This allows an attacker to inject and execute arbitrary scripts within the application's context.
Impact-This vulnerability enables attackers to execute unauthorized scripts on the client-side, leading to session hijacking, data theft, or defacement of the web application. It can compromise user privacy, damage the application's reputation, and potentially expose sensitive information to malicious actors.
|
|
61 | *Title: Critical Security Vulnerability: Unauthorized A ... | Closed | 18.07.2024 |
Task Description
*Title: Critical Security Vulnerability: Unauthorized Account Deletion via Limited Permissions* in [admin.alwaysdata.com]
Summary:* During my investigation, I discovered a significant security flaw in the system's account management feature.
*Description:* The system allows users to invite others to manage their accounts with varying permissions, including the ability to enforce two-factor authentication (2FA) before accessing account management privileges.
*Vulnerability Details:* I identified a vulnerability wherein an invited user, even without sufficient permissions or 2FA activation, can delete the inviting user's account from their own account. This deletion occurs regardless of whether 2FA was enabled during the invitation process.
*Steps to Reproduce the Bug:* 1. Create two accounts. 2. Invite a user to administer your account and enable 2FA. 3. From the invited user's account, delete the account of the inviting user. 4. Observe that the inviting user's account is permanently deleted, despite prior 2FA activation or the absence of sufficient permissions granted.
I sent proof of concept: https://admin.alwaysdata.com/support/77431/374527-bandicam%202024-07-17%2003-48-55-255.mp4
*Impact:*
This security vulnerability poses a significant risk to user accounts within the system. It allows an invited user, even with limited permissions and without activating two-factor authentication (2FA), to permanently delete the account of the inviting user. This action occurs despite security measures initially set up, such as 2FA activation during the invitation process or inadequate administrative permissions granted.
|
|
60 | On-click Delete any invitation in [admin.alwaysdata.com ... | Closed | 30.07.2024 |
Task Description
On-click Delete any invitation in [admin.alwaysdata.com]
*Summary:* The [Create My Own Site] web application system is vulnerable to a click grabbing attack that allows an attacker to trick the user into deleting invitations that they have sent or received without their knowledge.
*Reproduction steps:* 1. Send an invitation to another user. 2. Receive an invitation and try it on the other account. 3. Get the direct link to the invitation and add the /cancel/ command to the URL. 4. Create an HTML proof-of-concept file with the following content:
Programming Language
<a href="https://admin.alwaysdata.com/transfer/Invitation_Number/cancel/----">Click</a>
5. Host this HTML page or send it via link to the victim. 6. Once the victim clicks on the masked link, the invitation is deleted without their explicit consent or knowledge.
An attacker could use their location and attach an HTML file instead of sending a file that the user clicks.
I have sent a proof of concept: https://admin.alwaysdata.com/support/77431/374245-bandicam%202024-07-14%2007-00-17-624.mp4
*Impact:* The exploit allows the deletion of any invitation that the user has sent or reached another user without his consent.
|
|
59 | Unauthorized Account Takeover via Invitation Exploitati ... | Closed | 29.07.2024 |
Task Description
*Vulnerability Summary: Unauthorized Account Takeover via Invitation Exploitation in [admin.alwaysdata.com]
Vulnerability Description:
A critical security vulnerability was identified in the account invitation process of [Service that allows the user to create a site]. This vulnerability allowed an unauthorized user to gain administrative control over another user's account through the invitation feature. Below is a detailed timeline of events leading to the account takeover:
1. Account Creation:
- A user (referred to as User A) created an account on [Service that allows the user to create a site].
2. Incorrect Invitation:
- User A intended to invite a member to become an administrator but mistakenly sent the invitation to another user (User B).
3. Invitation Deletion:
- Realizing the mistake, User A promptly deleted the invitation intended for User B.
4. Correct Invitation:
- User A subsequently invited their colleague (referred to as User C) to become an administrator of their account.
5. Acceptance by Colleague:
- User C accepted the invitation, assuming administrative rights as intended by User A.
6. Unauthorized Acceptance:
- Meanwhile, User B, who received the initial invitation in error, noticed the invitation and, potentially unaware of the implications, accepted it.
7. Account Takeover:**
By accepting the invitation, User B gained administrative access to User A's account, effectively taking ownership of the account.
I've sent a proof of concept: [REDACTED]
Impact: Account Takeover
|
|
58 | Missing Invitation Link for Existing Users | Closed | 12.07.2024 |
Task Description
Summary:
A vulnerability was discovered where a user with an existing account is not sent an invitation link when added to an organization, potentially leading to confusion and unauthorized access.
Impact:
- User unable to access organization resources - Potential unauthorized access to sensitive information - Increased risk of account takeover
Expected Result:
- User with an existing account should receive an invitation link to join the organization - User should be prompted to accept the invitation and join the organization
Actual Result:
- No invitation link is sent to the user - User is not prompted to accept the invitation and join the organization
Severity according to CVSS 3:
- Attack Vector (AV): Network (N) - Attack Complexity (AC): Low (L) - Privileges Required (PR): None (N) - User Interaction (UI): None (N) - Sensitivity (S): Medium (M) - Confidentiality (C): Medium (M) - Integrity (I): Medium (M) - Availability (A): Medium (M)
CVSS 3 Score: 6.5 (Medium)
Steps to Reproduce:
1. Add a user with an existing account to an organization 2. Observe no invitation link being sent to the user 3. Verify the user's inability to access organization resources
Recommended Fix:
1. Implement automatic invitation link sending for existing users 2. Ensure users receive a prompt to accept the invitation and join the organization 3. Validate user accounts and organization membership to prevent unauthorized access
Conclusion:
This vulnerability poses a medium risk to user access and organization security. Implementing automatic invitation link sending for existing users will ensure proper access and prevent unauthorized access attempts.
|
|
57 | Lack of Password Confirmation on Delete Account and GET ... | Closed | 15.07.2024 |
Task Description
Summary:
A vulnerability was discovered where the delete account functionality lacks password confirmation and is vulnerable to GET-based CSRF, potentially allowing attackers to delete accounts without authorization.
Impact:
- Unauthorized account deletion - Potential data loss - Increased risk of account takeover
Expected Result:
- Password confirmation should be required to delete an account - CSRF protection should prevent unauthorized requests
Actual Result:
- No password confirmation is required to delete an account - GET-based CSRF vulnerability allows unauthorized account deletion
Steps to Reproduce:
1. Login to the application 2. Trick the user into clicking a malicious link to delete their account: https://admin.alwaysdata.com/admin/details/1/delete 3. User click submit 4. Observe the account being deleted without password confirmation
Recommended Fix:
1. Implement password confirmation requirement for delete account functionality 2. Implement CSRF protection for delete account functionality 3. Validate requests to prevent unauthorized account deletion
Conclusion:
This vulnerability poses a critical risk to user accounts and data. Implementing password confirmation and CSRF protection for delete account functionality will prevent unauthorized account deletion and ensure the security and integrity of user accounts.
|
|
56 | Unauthorized Organization Creation | Closed | 12.07.2024 |
Task Description
Summary: A vulnerability was discovered where a user who is not given permission on invite is still able to create a new organization, potentially leading to unauthorized access and data breaches.
Impact:
- Unauthorized access to sensitive information - Potential data breaches - Increased risk of account takeover
Expected Result:
- User without permission should not be able to create a new organization - User should only be added to the organization with proper permission
Actual Result:
- User without permission is given a new organization on accepting invite - User is added to the new organization with unnecessary permissions
Steps to Reproduce:
1. Invite a user without permission 2. Observe the user creating a new organization 3. Verify the user's unnecessary permissions in the new organization
Recommended Fix: 1. Implement permission checks to prevent unauthorized organization creation 2. Ensure users are only added to organizations with proper permission 3. Validate user permissions on each request to prevent abuse
Conclusion:
This vulnerability poses a critical risk to sensitive information and user accounts. Implementing proper permission checks and validation will prevent unauthorized access and ensure the security and integrity of user accounts.
|
|
55 | Session Not Invalidated on Permission Change | Closed | 12.07.2024 |
Task Description
Summary:
A vulnerability was discovered where the session is not invalidated when permissions are changed, potentially allowing attackers to access sensitive information without proper authorization.
Impact:
- Unauthorized access to sensitive information - Potential data breaches - Increased risk of account takeover
Expected Result:
- Session should be invalidated when permissions are changed - User should be prompted to re-authenticate with new permissions
Actual Result:
- Session remains active after permission change - User retains access to sensitive information without re-authentication
Steps to Reproduce:
1. {Browser A → Admin}Login to the application 2. {Browser A → Admin}Change permissions for the user 3. {Browser B → User}Login to the application 4. Observe the session remaining active 5. Attempt to access sensitive information
Recommended Fix:
1. Invalidate the session when permissions are changed 2. Require users to re-authenticate with new permissions 3. Implement additional security measures, such as token-based authentication and secure cookie management
Conclusion:
This vulnerability poses a critical risk to sensitive information and user accounts. Invalidating the session when permissions are changed will prevent unauthorized access and ensure the security and integrity of user accounts.
|
|
54 | Lack of Verification Email | Closed | 06.06.2024 |
Task Description
### Summary The website does not verify email addresses during the account creation process, which can lead to various security issues such as spam, abuse, and account recovery problems.
### Steps to Reproduce 1. Go to the account creation page.https://www.alwaysdata.com/en/register/ 2. Enter any email address and complete the registration process. 3. Notice that no email verification step is required.
### Impact - Spam and Abuse: Unverified accounts can be used to flood the system with spam or perform malicious activities. - User Impersonation: An attacker can use someone else's email address, leading to possible impersonation issues. - Account Recovery Problems: Users might face difficulties in recovering their accounts if email addresses are not verified.
### Recommendation Implement email verification as a mandatory step in the account creation process to ensure that the email addresses are valid and belong to the users registering them.
|
|
53 | Lack of Email Confirmation During Account Creation | Closed | 05.06.2024 |
Task Description
Severity: High
Vulnerability Description: The website allows users to create accounts without verifying their email addresses. This practice poses significant security and usability risks.
Impact:
Spam and Fake Accounts:
Malicious users can create multiple fake accounts, leading to spam and abuse of the platform. Automated scripts (bots) can exploit this vulnerability to flood the system with fake accounts, overwhelming resources and degrading performance. Account Security:
Unauthorized users can create accounts using someone else's email address, potentially leading to privacy breaches and unauthorized access to personal information. Genuine users might be unable to access their accounts if their email addresses are misused by others.
Communication Failures:
Users may not receive important notifications, updates, or password reset instructions, leading to poor user experience and support issues.
Reputation and Trust:
The lack of basic security measures can lead to loss of trust among users and damage the website's reputation. Users might perceive the platform as insecure and unreliable, leading to reduced user retention and engagement. Steps to Reproduce: Navigate to the account creation page. Enter any email address (including ones that do not belong to the user) and complete the registration process. Observe that the account is created and accessible without any email verification step.
Recommended Mitigation:
Implement Email Verification:
During registration, send a confirmation email to the provided email address containing a unique verification link. Require users to click on the verification link to activate their accounts. Use CAPTCHA:
Incorporate CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) during the registration process to prevent automated bots from creating accounts.
Rate Limiting:
Implement rate limiting on the account creation endpoint to prevent mass account creation from the same IP address within a short period.
Audit Existing Accounts:
Review existing accounts for potential fake or unauthorized accounts and take appropriate actions, such as sending verification requests or disabling suspect accounts.
References: OWASP Authentication Cheat Sheet: OWASP Authentication Cheat Sheet NIST Digital Identity Guidelines: NIST SP 800-63B
|
|
52 | Direct IP Access of the Domain on HTTP | Closed | 05.06.2024 |
Task Description
Hello Team, My Name Is Pawan Yadav, a cyber security researcher from India. While testing one of your domains, I have found a vulnerability in your site.
Here is the detailed report:
Vulnerability Description :- Direct IP access refers to the ability to access a website or service directly via its IP address rather than its domain name (e.g., http://185.31.40.186/ instead of https://admin.alwaysdata.com/login/?next=/ ). Direct IP access can bypass certain security controls implemented at the domain level, potentially exposing sensitive information or allowing unauthorized access to resources.
Attack Vector :- An attacker can directly access the web application by using its IP address, bypassing domain- based security controls such as Web Application Firewalls (WAFs), IP filtering, or access controls based on the domain name. Domain :- https://admin.alwaysdata.com/login/?next=/ Direct IP Access :- http://185.31.40.186/ Reference :- https://www.nexgi.com/digital-library/direct-ip-access/
Impact:-
Denial of Service : Direct IP-address Access has its own set of issues. For starters, it increases the chances to encounter a Distributed Denial of Service attack. Data Interception: Attackers can intercept and read sensitive information transmitted between the server and clients, such as login credentials, personal information, and payment details. Man-in-the-Middle Attacks: This vulnerability enables attackers to intercept and potentially alter the communication between the server and client, leading to unauthorized data modification or injection of malicious content. Loss of User Trust: A lack of HTTPS can undermine the trust and credibility of the website among its users, potentially leading to decreased user engagement and conversions.
POC
https://drive.google.com/file/d/19idNkDidehPI_SR3qQfvArwgCSji7elc/view?usp=sharing
|
|
51 | Multiple Free Public Cloud accounts obtained by a singl ... | Closed | 25.04.2024 |
Task Description
Description
Alwaysdata allows users to create a Free Public Cloud (100MB) account. Each user is limited to having only one Free Public Cloud (100MB account. However, I discovered that a user can bypass this restriction and obtain multiple Free Public Cloud (100MB) accounts by asking other users to create a new free account and then transfer ownership of that account to them.
Reproduction Steps
1. User A creates a new Free Public Cloud (100MB) storage account 2. User B creates a new Free Public Cloud (100MB)storage account 3. User B transfers ownership of their account to User A through: https://admin.alwaysdata.com/admin/account/ 4. User A now has two Free Public Cloud (100MB)storage accounts (their original account and the one transferred from User B) 5. This process can be repeated with same user B for unlimited times to accumulate unlimited no of free accounts.
Impact
By exploiting account ownership transfers, a user can essentially obtain unlimited free storage, potentially leading to loss for alwaysdata
Recommendation
Implement additional checks and restrictions to prevent users from obtaining multiple free accounts through ownership transfers. Possible mitigations could include:
1. Limiting the number of free accounts a user can own, regardless of the acquisition method (creation or transfer). 2. Disallowing ownership transfers for free accounts or requiring explicit approval from the service provider. 3. Automatically consolidating multiple free accounts under the same user into a single account, preserving the total storage limit.
Proof of Concept:
|
|
50 | *Title:* Two-Factor Authentication Bypass via Support T ... | Closed | 24.04.2024 |
Task Description
*Title:* Two-Factor Authentication Bypass via Support Ticket Creation in [admin.alwaysdata.com]
*Summary:* A critical security vulnerability has been identified in the [admin.alwaysdata.com]'s account management system where a user with administrative privileges but mandated to use two-factor authentication (2FA) can bypass this requirement by initiating a support ticket under the name of the primary account holder without triggering 2FA.
*Description:* This vulnerability allows an added user, who is supposed to be restricted by 2FA, to perform actions appearing as the primary account holder by submitting support tickets. This circumvents the security protocol intended to protect sensitive account operations via 2FA, potentially leading to unauthorized actions without the account holder's consent or knowledge.
*Steps to Reproduce:* 1. Create two user accounts, Account A (primary) and Account B. 2. From Account A, add Account B as another user with full administrative privileges but enforce 2FA on actions. 3. Log into Account B. 4. Navigate to the support section and initiate a support ticket, selecting Account A as the affected account. 5. Submit the ticket without being prompted for 2FA verification.
I sent a proof of concept : https://admin.alwaysdata.com/support/77431/367474-VID-20240423-WA0000.mp4
*Impact:* The primary account holder's security is compromised as the added user can perform sensitive operations under their guise without completing the necessary 2FA checks. This vulnerability may lead to unauthorized access and control over the primary account's sensitive functions and data.
|
|
49 | Vulnerability Report: Lack of Rate Limiting on Password ... | Closed | 24.04.2024 |
Task Description
The website does not implement rate limiting on password reset links, allowing an attacker to repeatedly request password reset links for any account. This could lead to account takeover through brute-force attacks.
Description When an attacker gains access to a target account's email address, they can repeatedly request password reset links without any rate limiting in place. This allows them to flood the target's email inbox with reset links, making it difficult for the legitimate user to identify and use the valid reset link. Additionally, the attacker can automate this process, increasing the efficiency of the attack.
Impact Account Takeover: Attackers can potentially take over user accounts by flooding their email inbox with reset links, making it easier to intercept a valid reset link and gain unauthorized access. User Disruption: The flood of reset links can disrupt the user's ability to use their email normally, causing inconvenience and potential confusion.
Recommendations Implement rate limiting on password reset requests to prevent brute-force attacks. Limit the number of password reset links that can be requested per minute per IP address or account. Implement CAPTCHA or other mechanisms to distinguish between automated and legitimate requests.
Steps to Reproduce 1- Go To This Link https://admin.alwaysdata.com/login/ Enter your Email Click On Forget Password 2- intercept burp and send request to intruder 3- make payload and start attack
Supporting Material/References
OWASP Password Reset Best Practices
Impact Account Takeover User Disruption
Proof of Concept N/A (Describe how you were able to successfully exploit the vulnerability.)
Remediation Implement rate limiting on password reset requests to prevent brute-force attacks. Limit the number of password reset links that can be requested per minute per IP address or account. Implement CAPTCHA or other mechanisms to distinguish between automated and legitimate requests.
Supporting Material/References OWASP Password Reset Best Practices
Impact Account Takeover User Disruption
Proof of Concept
SS ATTACHED
REQUEST** (BY USING BRUP SUITE)
POST /password/lost/ HTTP/2 Host: admin.alwaysdata.com Cookie: REACTED User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://admin.alwaysdata.com/password/lost/ Content-Type: application/x-www-form-urlencoded Content-Length: 116 Origin: https://admin.alwaysdata.com Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 Te: trailers
csrfmiddlewaretoken=8GNhIyHjyRaBHSlBRaaN9gMWKaksiJR3Py8S3TJoW8zb7tq5gU4JzRA1cMEp0VHl&email=alexdoppler29%40gmail.com
SS LINK - https://drive.google.com/file/d/1a0vqAOB6u6ayQSNX4ktQuUOWIAgNQjAR/view?usp=sharing
|
|
48 | Clickjacking (On-click) Vulnerability in Support Ticket ... | Closed | 24.04.2024 |
Task Description
*Title:* Clickjacking (On-click) Vulnerability in Support Ticket Attachment Deletion in [admin.alwaysdata.com]
*Summary:* The support ticket system of the web application is vulnerable to a clickjacking attack that allows an attacker to trick a user into deleting attachments from their support tickets unknowingly.
On-click Delete any attachment for users in support tickets Delete any attachment for users in technical support tickets
*Steps to Reproduce:* 1. Create a support ticket in the application. 2. Attach a file to the support ticket. 3. Obtain the direct link of the attachment and append the /delete/ command to the URL. 4. Create an HTML proof-of-concept file with the following content:
html
<a href="https://admin.alwaysdata.com/support/----/delete/----">click</a>
5. Host this HTML page or send it via link to the victim. 6. Once the victim clicks on the disguised link, the attachment is deleted without their explicit consent or knowledge.
An attacker can use his location and attach an html file instead of sending a file that the user clicks on.
*Impact:* The exploit enables unauthorized deletion of any attachment from user-created support tickets. This can result in loss of critical data and potential breach of information security, affecting data integrity and user trust.
This is in addition to this report as I explained in another way but I remembered now that the attacker had to delete any technical support ticket in the way I explained in this report link: https://security.alwaysdata.com/task/24
|
|
47 | information disclosure | Closed | 13.04.2024 |
Task Description
i found this detial in one of the git file on https://security.alwaysdata.com/.git/config
and this file contains 0000000000000000000000000000000000000000 58bea729f4359a45f69aaba274bb2a931155b427 Cyril Baÿ cbay@alwaysdata.com 1704809861 +0100 clone: from https://github.com/flyspray/flyspray.git
this information in the master named file which i think is sensitive as it disclosing the email address and other stuff also other files like config and packed-refs contain sensitive information , but its all on you to decide weather the information is sensitive or not contact me on my email bhavishthakral123@gmail.com
|
|
46 | Open Redirection Vulnerability | Closed | 13.04.2024 |
Task Description
Hi Team,
I hope this email finds you well. I am Ali Haider, a security researcher and a penetration tester. I have been a bug bounty hunter for almost 2 years now. I always enjoyed the challenge of finding vulnerabilities, as it always felt like a great achievement to find them. I wanted to bring to your attention a Open Redirection Vulnerability I encountered while using your website.
|
|
45 | Bug Title: Missing access control at password change. | Closed | 09.04.2024 |
Task Description
Hello Web Security Severity: Medium Domain: https://admin.alwaysdata.com
Description : A security researcher discovered that after resetting a password, the user was automatically logged in. As such, compromising a legitimate password reset link (via referrer token leakage or a similar issue) could lead to compromising the account since the user would not be forced to log in after resetting their password.
Proof Of Concept: 1.Go to this website:(https://admin.alwaysdata.com) 2.Send the password reset link to your email. 3.Go to your email and open the link. 4.Set a new password. 5.Boom.Automatically logged in.
Fix: OWASP forgot password recommendations(https://www.owasp.org/index.php/Forgot_Password_Cheat_Sheet) suggest a better approach, which we have now implemented.
Thanks.
Reference : https://hackerone.com/reports/164648 https://hackerone.com/reports/255020
|
|
44 | Security Vulnerability | Business Logic Flaw | Closed | 28.03.2024 |
Task Description
Subject: Business Logic Flaw
Dear Security Team,
I trust this message finds you well in safeguarding our digital domain. I have successfully conducted a penetration test and am pleased to present the detailed findings in the attached report below.
Vulnerability Details:
Type: Business Logic Flaw Severity: Medium Vulnerable Endpoint: https://admin.alwaysdata.com/admin/account/add/ Description: The vulnerability enables attackers to bypass the restriction limiting the creation of only one Free Public Cloud (100MB). By exploiting this vulnerability, known as a race condition, an attacker can create more than 1 instances of the Free Public Cloud (100MB), potentially leading to resource abuse and unauthorized usage.
Reproduction Steps: Log into the attacker’s account. Remove all previous accounts from the attacker’s main account. Attempt to add 2 Free Public Cloud (100MB), which will fail due to the existing function limitation. To bypass this limitation, delete all Free Public Cloud (100MB) instances and capture the request to add a Free Public Cloud (100MB) using BurpSuite. Duplicate the captured request in multiple tabs and modify the account names in each request. Group all the requests and configure them to be sent in parallel (Single Packet Attack) in BurpSuite. This will result in the addition of more than one Free Public Cloud (100MB). Proof Of Concept:
Image & video-based POC is connected to the email.
Impact:
The impact of this vulnerability is significant as it allows attackers to bypass restrictions and manipulate the system to their advantage. By exploiting this flaw, attackers can create multiple instances of the Free Public Cloud (100MB), despite the intended limitation of only one. This can lead to several adverse consequences
Mitigations: Increased resource usage and financial losses. Risks of data breaches and damage to reputation.
NOTE: THESE ATTACKS HAVE BEEN DONE WHILE KEEPING SERVER’S SECURITY IN MIND, ENSURING THAT THE SERVER DOES NOT INCUR ANY DAMAGE. THIS ATTACK HAS BEEN PERFORMED WITH CAUTION.
Regards, Zeeshan Beg
Google Drive POC Link : https://drive.google.com/file/d/1qz6s7g6l1dYsF1aq3PpAoIyzeodZTUBx/view?usp=sharing
|
|
43 | Information Disclosure PHPpgAdmin | Closed | 03.04.2024 |
Task Description
Vulnerability Detail
PHPpgAdmin setup page is accessible over the internet in which it's possible for the user setup the servers with required details.
Vulnerable Endpoints
https://phppgadmin.alwaysdata.com/phppgadmin/redirect.php?subject=root You can add a server via this endpoint https://phppgadmin.alwaysdata.com/phppgadmin/redirect.php?subject=server&server=&
Impact Its possible for an attacker to configure the servers without information of the application adminstrator.
|
|
42 | Git Configuration Exposure | Closed | 27.03.2024 |
Task Description
Vulnerability Git Configuration Exposure
Severity Level Critical
Vulnerable Domain: https://upload.alwaysdata.com/.git/config
1. Executive Summary: The Git Configuration Exposure vulnerability poses a significant threat to web applications, allowing unauthorized access to sensitive source code repositories. Through the discovery of exposed .git/ directories, attackers can leverage this information to extract the complete source code of a website. This breach can result in the unauthorized disclosure of sensitive information, including proprietary code, configuration files, and other critical assets. This executive summary outlines the discovery, impact, and recommended mitigation strategies for this vulnerability.
2. Overview The vulnerability arises when an attacker identifies the presence of a .git/config directory. This discovery provides a direct route to the Git repository of a web application. By employing specialized tools such as those available in Kali Linux, an attacker can download the entire source code of the website, gaining access to proprietary code, scripts, and configuration files. The consequences of this exposure extend beyond the compromise of intellectual property to potential security risks and the unauthorized retrieval of sensitive information.
3. Vulnerability Discovery The vulnerability is discovered through directory research, where the presence of a .git/config directory is identified. Attempts to access this directory reveal the underlying Git repository, providing a pathway for unauthorized individuals to exploit the exposed version control system.
4. Impact Unauthorized Access to Source Code: Attackers can download the complete source code of the website, enabling the extraction of proprietary code, scripts, and configuration files. Intellectual Property Theft: The compromise of source code poses a significant risk of intellectual property theft, potentially leading to unauthorized use or distribution. Sensitive Information Exposure: The extracted source code may contain sensitive information, such as API keys, database credentials, and other critical data, compromising the overall security of the web application.
5. Mitigation Strategies
Git Configuration Hardening: Implement strict access controls and configure Git repositories to restrict access to authorized personnel only. Directory Listing Prevention: Disable directory listing to prevent the exposure of .git directories during web server configuration. Git Repository Hosting Security: If using third-party Git repository hosting services, ensure proper access controls are in place, and sensitive information is not exposed.
6. Steps To Reproduce:
1- Visit this URL = https://upload.alwaysdata.com/.git/config 2- You can see the Config file. 3- Using the gitdumper tool, in which I was able to dump the whole .git directory. 4- Boom!! I have access to the whole source code of the application. 4- Command –> ./git_dumper.py https://upload.alwaysdata.com/.git/ your/any/directory/of/kali
Important Note: Another thing I'd like to share with you is that I haven't extensively exploited this vulnerability. Otherwise, I could have easily downloaded the entire website's source code, which often contains many and many sensitive information.
Proof of concept As you can see that I am able to access the entire source code. Now, if I put the output command to my command, I can download the whole source code.
[-] Testing https://upload.alwaysdata.com/.git/HEAD [200] [-] Testing https://upload.alwaysdata.com/.git/ [403] [-] Fetching common files [-] Fetching https://upload.alwaysdata.com/.git/hooks/commit-msg.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/pre-commit.sample [200] [-] Fetching https://upload.alwaysdata.com/.gitignore [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/applypatch-msg.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/COMMIT_EDITMSG [404] [-] https://upload.alwaysdata.com/.git/COMMIT_EDITMSG responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/hooks/post-commit.sample [404] [-] https://upload.alwaysdata.com/.git/hooks/post-commit.sample responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/hooks/pre-push.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/pre-rebase.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/pre-receive.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/index [200] [-] Fetching https://upload.alwaysdata.com/.git/info/exclude [200] [-] Fetching https://upload.alwaysdata.com/.git/objects/info/packs [404] [-] https://upload.alwaysdata.com/.git/objects/info/packs responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/hooks/update.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/prepare-commit-msg.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/post-receive.sample [404] [-] https://upload.alwaysdata.com/.git/hooks/post-receive.sample responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/hooks/post-update.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/hooks/pre-applypatch.sample [200] [-] Fetching https://upload.alwaysdata.com/.git/description [200] [-] Finding refs/ [-] Fetching https://upload.alwaysdata.com/.git/info/refs [404] [-] https://upload.alwaysdata.com/.git/info/refs responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/ORIG_HEAD [404] [-] Fetching https://upload.alwaysdata.com/.git/config [200] [-] https://upload.alwaysdata.com/.git/ORIG_HEAD responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/FETCH_HEAD [404] [-] https://upload.alwaysdata.com/.git/FETCH_HEAD responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/logs/HEAD [200] [-] Fetching https://upload.alwaysdata.com/.git/packed-refs [200] [-] Fetching https://upload.alwaysdata.com/.git/refs/heads/master [200] [-] Fetching https://upload.alwaysdata.com/.git/refs/remotes/origin/master [404] [-] https://upload.alwaysdata.com/.git/refs/remotes/origin/master responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/refs/stash [404] [-] https://upload.alwaysdata.com/.git/refs/stash responded with status code 404 [-] Fetching https://upload.alwaysdata.com/.git/refs/remotes/origin/HEAD [200] Many More File will be Fatched…..!
|
|
41 | Directory Listing of Unauthorized Xapian Files | Closed | 27.03.2024 |
Task Description
Vulnerable URL's: https://files.alwaysdata.com/ https://files.alwaysdata.com/migrations/ https://files.alwaysdata.com/migrations/software-2017/ https://files.alwaysdata.com/migrations/software-2020/
Summary:
The vulnerability was discovered during security testing when the directory listing feature of a web server listed the xapian-7.3.so file among its contents. Given that xapian-7.3.so is a shared object file for Xapian, a highly versatile search engine library, its exposure poses significant security risks. This file contains compiled code that is executed within the server context, making it a critical component of the search functionality offered by the hosting server.
Impact:
The inadvertent exposure of xapian-7.3.so could have several potential impacts:
Information Disclosure: Malicious actors could download and analyze the shared object file to uncover proprietary algorithms or specific implementations of the search engine, leading to a competitive disadvantage or privacy violations. Security Vulnerability Exploitation: If any vulnerabilities exist within the specific version of the file, attackers could develop exploits to compromise the server or manipulate search engine results. Service Disruption: In scenarios where the file is not merely exposed but also manipulable or deletable, attackers could disrupt the search functionality, leading to denial of service.
Mitigation
Immediate steps should be taken to mitigate the vulnerability:
Disable Directory Listing: Configure the web server to disable directory listing globally or specifically within directories not intended for public access. Access Controls: Implement proper access controls to ensure that sensitive files, such as xapian-7.3.so, are not accessible via the web server to unauthorized users. Security Patches: Ensure that all components, especially exposed ones like xapian-7.3.so, are regularly updated to the latest versions to mitigate known vulnerabilities.
|
|
40 | No Rate Limit On Reset Password in admin.alwaysdata.co ... | Closed | 27.03.2024 |
Task Description
No Rate Limit On Reset Password in admin.alwaysdata.com
welcome all : i found that no rate limit in reset password in ::: https://admin.alwaysdata.com/password/lost/ Summary: No rate limit check on forgot password which can lead to mass mailing and spamming of users and possible employees A little bit about Rate Limit: A rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache. Steps To Reproduce The Issue 1- create account and go to reset password 2- intercept burp and send request to intruder 3- make payload and start attack
Impact 1- Attacker could use this vulnerability to bomb out the email inbox of the victim. 2- Attacker could send Spear-Phishing to the selected mail address. 3-Causing financial losses to the company
|
|
39 | PII Disclosure | Closed | 28.03.2024 | |
|
38 | Bug Title: Prototype Pollution Vulnerability Report | Closed | 19.03.2024 | |
|
37 | unverified password change in [admin.alwaysdata.com] | Closed | 27.03.2024 | |
|
35 | Git Folder Forbidden Bypass | Closed | 22.02.2024 | |
|
34 | Unvalidated Input vulnerability in Class_Join feature a... | Assigned | | |
|
33 | Privilege Escalation in admin.alwaysdata.com - Academic ... | Closed | 16.02.2024 | |
|
32 | Server Path Traversal + Information Disclosure on admin ... | Closed | 15.02.2024 | |
|
31 | Broken Access Vulnerability via 'Impossible deletion' E ... | Closed | 16.02.2024 | |
|
30 | Information Disclosure on cAdvisor software via Origin ... | Closed | 16.02.2024 | |
|
29 | URL Override in api.alwaysdata.com | Closed | 16.02.2024 | |
|
28 | Summary: A username disclosure vulnerability has been i ... | Closed | 13.02.2024 | |
|
27 | Text Injection | Closed | 06.02.2024 | |
|
26 | #1 Crititical Vulnerability Name: No Rate Limit in addi ... | Closed | 06.02.2024 | |
|
25 | Title: Security Report: Public Exposure of Sensitive In ... | Closed | 04.02.2024 | |
|
24 | Security Report:Broken Access Control (BAC) in [admin.a ... | Closed | 01.02.2024 | |
|
23 | Subject: Vulnerability Report: Transmission of Credenti ... | Closed | 02.02.2024 | |
|
22 | Vulnerability Report: Unverified Email Registration on ... | Closed | 31.01.2024 | |
|
21 | Bug Bounty Report | Closed | 04.02.2024 | |
|
20 | Unauthorized Access to Over 6000+ Valid User Credential ... | Closed | 30.01.2024 | |
|
19 | User Enumeration Through Forgot Password Vulnerability | Closed | 29.01.2024 | |
|
18 | .git file exposed | Closed | 18.01.2024 | |
|
17 | Lack of password confirmation on account deletion | Closed | 19.01.2024 | |
|
16 | Unauthenticated-Video conferencing on "https://jitsi.al ... | Closed | 18.01.2024 | |
|
15 | Bug Bounty|User credential Leaked on Github-dork | Closed | 18.01.2024 | |
|
14 | Potential SSRF Vulnerability via Self-XSS | Closed | 18.01.2024 | |