|
33 | Privilege Escalation in admin.alwaysdata.com - Academic ... | Closed | 16.02.2024 |
Task Description
Description
A vulnerability has been discovered in the student management system, which allows a normal user account to bypass access controls. ANY registered low-level user, with no knowledge or involvement in a class, can globally detach any student involved just by manipulating the UID. Even without tutorship/academic privileges and regardless of tutor access control.
Impact
A malicious attacker could fuzz predictable UID values and remove multiple students, abusing the privesc as a nuisance.
Proof-of-Concept
1) First, we logged in to an actual tutor account where I've added a few students. Next, I take note of the IDs of each student involved.
2) Then, I logged out and just to validate this exploit, I would create a NEW account.
3) This is the vulnerable endpoint:
https://admin.alwaysdata.com/academic/release/<USER_ID>
I replaced the <USER_ID> param with the various IDs I recorded from the tutor account.
4) Visit these URLs on the new account and observe the results.
5) Then, log out and re-login to the tutor account. Visit https://admin.alwaysdata.com/academic/ and confirm poc validity.
Mitigation
Implement proper access controls and role-based permissions to restrict normal users from utilizing global admin/tutor privileges. Conduct a thorough review of the authentication and authorization processes to ensure that no other similar vulnerabilities exist.
POC video: https://file.io/DRmuH2Qk7wZk
|
|
32 | Server Path Traversal + Information Disclosure on admin ... | Closed | 15.02.2024 |
Task Description
Description
I identified a vulnerability in the SSH function of admin.alwaysdata.com, where the home directory setting is vulnerable to server path traversal.
Proof-of-Concept
1. Login to your account and visit https://admin.alwaysdata.com/ssh
2. Edit the home directory from '/' to '/../../../../../../'
3. Next, save the settings and login to your SSH shell. Type ls. You'll discover your path has been traversed.
4. Access the /alwaysdata/etc/passwd folder to view the admin superusers. More information of other users are also available throughout the server.
For example;
/var/lib/extrausers/passwd shows all the other registered users on the server.
/usr/lib/python3/dist-packages/fail2ban/tests/files/logs/postfix display failban logs.
Other interesting files;
/usr/lib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/basic/authz_owner/.htpasswd
/usr/lib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_wrongrelm/.htpasswd
Mitigation
Restrict access to any parent directory, other than the container being run.
|
|
31 | Broken Access Vulnerability via 'Impossible deletion' E ... | Closed | 16.02.2024 |
Task Description
Description
A vulnerability exists on the https://admin.alwaysdata.com/ permissions_delete endpoint which is intended for deleting sub-accounts' generated data or permissions. However due to unsecure design, it can also be used to remove critical permissions or access controls of the owner account, rendering the account useless.
Proof-of-Concept
1. Visit this URL: https://admin.alwaysdata.com/permissions/<owner-id>/delete/ (Replace owner-id with the the id of main account, that is, the one with 'impossible deletion')
2. This renders the account useless. But permissions can still be reinstated using the following request
POST /permissions/<account-id>/ HTTP/2
Host: admin.alwaysdata.com
Cookie: csrftoken=nHI6Qy3zJu9uxxxqNvXRuZlTuvgLJwbBI5jg4XRa; django_language=en; sessionid=tdcg6j9im2g31ga9tk7
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://admin.alwaysdata.com/permissions/
Content-Type: application/x-www-form-urlencoded
Content-Length: 314
Origin: https://admin.alwaysdata.com
csrfmiddlewaretoken=U0CcqjIPBxxxxxxxxxxxx2zGI69d7GFBI5AKORMPsTJlk1SfgDJZ5t&csrfmiddlewaretoken=U0CcqjIPBxxxxxxxxxxxxxxxx7GFBI5AKORMPsTJlk1SfgDJZ5t&email=<EMAIL>&customer_account=on&customer_contact_billing=on&customer_full_accounts=on&customer_full_servers=on&account=<USERID>
Mitigation
Ensure that only authorized admin can access and modify owner permissions through the delete endpoint. This can be achieved by implementing authentication and authorization mechanisms.
|
|
30 | Information Disclosure on cAdvisor software via Origin ... | Closed | 16.02.2024 |
Task Description
Description
I discovered that cAdvisor, a container monitoring and management tool, is exposed to the public internet. Using OSINT techniques, this endpoint was discovered on one of the company servers. This information disclosure could potentially be used by attackers for various malicious purposes, such as mapping vulnerable targets or launching further attacks.
Proof-of-Concept
To demonstrate this issue, we can access the cAdvisor web interface via the URLs; http://185.31.41.177:8000/containers/ http://185.31.41.177:8000/metrics/ http://185.31.41.177:8000/api/v1.0/machine http://185.31.41.177:8000/containers/user.slice http://185.31.41.177:8000/containers/system.slice
Browse through the URIs for more information on processes running, users involved, resource usage, container names e.t.c.
Mitigation
Restrict access to cAdvisor. Limit access to the cAdvisor interface to trusted users or networks only.
|
|
29 | URL Override in api.alwaysdata.com | Closed | 16.02.2024 |
Task Description
Description
I discovered a potential vulnerability in api.alwaysdata.com that could allow an attacker to override URLs by manipulating the X-Forwarded-Host header. This issue could potentially lead to unintended redirections or access to restricted resources.
Proof-of-Concept
To demonstrate this vulnerability, we can use a simple HTTP request with a modified X-Forwarded-Host header. Replay the following request;
GET /v1/ssh/doc/ HTTP/1.1
Host: api.alwaysdata.com
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
Connection: close
Cache-Control: max-age=0
X-Forwarded-Host: evil.com
Cookie: flyspray=ef2b9025azb8fd028bf6
Referer: https://api.alwaysdata.com/doc
Mitigation
Blocking or filtering out the X-Forwarded-Host header entirely and relying on other methods to determine the original domain (e.g., using the Host header or server logs).
|
|
28 | Summary: A username disclosure vulnerability has been i ... | Closed | 13.02.2024 |
Task Description
Details: Upon accessing the URL endpoint https://blog.alwaysdata.com/wp-json/wp/v2/users/, the website returns a JSON response containing information about registered users, including usernames. This exposes user account details to anyone who accesses the endpoint, without requiring authentication.
Impact: The username disclosure vulnerability poses a significant risk to the security and privacy of users on the https://blog.alwaysdata.com website. Attackers can use the exposed usernames to attempt unauthorized access to user accounts, conduct targeted phishing attacks, or perform further reconnaissance to exploit additional vulnerabilities.
Recommendations:
Immediate Mitigation: Disable public access to the /wp-json/wp/v2/users/ endpoint to prevent unauthorized users from obtaining a list of user accounts.
Patch Deployment: Implement a security patch or update provided by the website’s developers to address the username disclosure vulnerability.
User Notification: Inform registered users of the vulnerability and advise them to change their passwords as a precautionary measure.
Security Audit: Conduct a comprehensive security audit of the website to identify and remediate any additional vulnerabilities that may exist.
Additional Information: This report aims to assist in promptly addressing the username disclosure vulnerability on the https://blog.alwaysdata.com website to safeguard user data and mitigate potential security risks. Urgent action is recommended to prevent exploitation and protect the website’s users from unauthorized access to their accounts.
Please feel free to reach out if further assistance or clarification is needed.
Sincerely, Nilesh nilesh56466@gmail.com
|
|
27 | Text Injection | Closed | 06.02.2024 |
Task Description
Description:
Content spoofing, also referred to as content injection, “arbitrary text injection” or virtual defacement, is an attack targeting a user made possible by an injection vulnerability in a web application. When an application does not properly handle user-supplied data, an attacker can supply content to a web application, typically via a parameter value, that is reflected back to the user. This presents the user with a modified page under the context of the trusted domain. This attack is typically used as, or in conjunction with, social engineering because the attack is exploiting a code-based vulnerability and a user’s trust.
Impact:
An attacker can use text injection vulnerability to present a customized message on the application that can phish users into believing that the message is legitimate. The intent is typical to tick victims, although sometimes the actual purpose may be to simply misrepresent the organization or an individual.
Steps to Reproduce:
1: Navigate to given URL: https://admin.alwaysdata.com/ 2: At the end of the URL enter /hacker 3: Now on the page you will see hacker is reflecting on page.
Poc: https://https://drive.google.com/file/d/1gG_U7sszvkvv3Rz8CxK89EW2wp7xtxC8/view?usp=sharing
|
|
26 | #1 Crititical Vulnerability Name: No Rate Limit in addi ... | Closed | 06.02.2024 |
Task Description
Vulnerability Name: No Rate Limit in adding Sites
Impact: - This may consume a large amount of bandwidth and, sometimes, require large amounts of storage space.
How to reproduce this issue:
1. Use Burp Suite and capture the Sites request.
2. Send the captured request to Intruder and select name position as shown in POC.
3. Set payloads to numbers and numbers will be from 1 to 40 (depending on your usage).
4. Observe that the status code is 302 means we can add an unlimited Sites.
Recommendation: 1. There should be some rate limit for Add Sites (Example: should not exceed more than 10 Sites)
2. Implement Captcha, the captcha should not be based on IP.
POC: - Video file in below link. - Link: https://www.mediafire.com/file/q9ir608diysdnhj/Always+Data+Poc-1.mp4/file https://mediafire.com/file/q9ir608diysdnhj/Always+Data+Poc-1.mp4/file
|
|
25 | Title: Security Report: Public Exposure of Sensitive In ... | Closed | 04.02.2024 |
Task Description
Title: Security Report: Public Exposure of Sensitive Information
Introduction: The purpose of this report is to highlight a critical security issue involving the public exposure of sensitive information on the website security.alwaysdata.com. The exposed data includes details about supervisors, the number of reports they have sorted, and some reports that remain unprocessed and may contain sensitive information and unpatched vulnerabilities.
Exposure of Supervisor Information: The website security.alwaysdata.com hosts a page that displays information about all users, including supervisors. The URL format for accessing supervisor information is https://security.alwaysdata.com/user/1. By manipulating the numeric value in the URL, it is evident that any user can access information about all users and supervisors on the site. This unrestricted access poses a significant security risk as it allows unauthorized individuals to view sensitive user data, potentially compromising the privacy and security of the users and the platform as a whole.
Unsecured Reports: Furthermore, the website contains reports that are in an unprocessed state and have not been closed. These reports are accessible to the public through the URL format https://security.alwaysdata.com/task/23?dev=1. The presence of such reports in an open state poses a severe security threat as they may contain sensitive information that should not be shared with regular users. Additionally, these reports may reveal unpatched vulnerabilities in the platform, further increasing the risk of exploitation by malicious actors.
Recommendations: 1. Immediate Restriction of Access: It is imperative to implement access controls to restrict public access to supervisor information and unprocessed reports. Access should be limited to authorized personnel with appropriate privileges.
2. Review and Remediation: All unprocessed reports should be reviewed to identify and address any sensitive information or vulnerabilities they may contain. Once remediated, these reports should be appropriately secured and closed.
3. Security Awareness Training: Conduct security awareness training for all personnel involved in managing and maintaining the website. Emphasize the importance of safeguarding sensitive data and the potential consequences of data exposure.
4. Regular Security Audits: Implement regular security audits to identify and address any potential security loopholes, including unauthorized access to sensitive information and unsecured reports.
Conclusion: The public exposure of supervisor information and unsecured reports on security.alwaysdata.com poses a significant security risk, potentially compromising user privacy and platform integrity. Immediate action is necessary to address these vulnerabilities and ensure the confidentiality and security of user data. Failure to mitigate these risks could lead to severe repercussions for the organization and its users.
|
|
24 | Security Report:Broken Access Control (BAC) in [admin.a ... | Closed | 01.02.2024 |
Task Description
Security Report:Broken Access Control (BAC) refers to a security vulnerability where users are able to access or manipulate resources that they are not authorized to
Introduction: Broken Access Control (BAC) refers to a security vulnerability where users are able to access or manipulate resources that they are not authorized to. In this report, we will discuss an instance of BAC where a user is able to delete a technical support ticket to which they have been invited, even though they do not have the necessary permissions to do so.
The user who is added to the ticket does not have the permission to delete the ticket, he is not the one who created it.
Command used to delete:https://admin.alwaysdata.com/support/"Ticket_Number"/delete/
Steps to reproduce the bug:
1- Open a technical support ticket 2- Add a user with you in the ticket 3- Try the delete order I sent you 4- You will notice that the invited user can delete the ticket completely and this is not his prerogative
Impact: The impact of this vulnerability is significant as it compromises the integrity and confidentiality of the technical support system. Unauthorized deletion of tickets can lead to loss of important information, disruption of support services, and potential security breaches if sensitive information is contained within the tickets.
|
|
23 | Subject: Vulnerability Report: Transmission of Credenti ... | Closed | 02.02.2024 |
Task Description
Subject: Vulnerability Report: Transmission of Credentials in Plain Text on Alwaysdata.com
Dear Security Team,
I hope this email finds you well. I am writing to report a security vulnerability that I discovered on the Alwaysdata.com platform regarding the transmission of credentials in plain text during the login process. This vulnerability poses a significant risk to the security and privacy of users' accounts and sensitive information.
Vulnerability Details:
Vulnerability Type: Transmission of Credentials in Plain Text Website: https://www.alwaysdata.com/ Description: During testing of the login process on the Alwaysdata.com platform, I observed that user credentials (email and password) are transmitted in plain text or with minimal obfuscation. While the CSRF token appears to be encrypted, the email and password fields are transmitted without proper encryption, making them susceptible to interception and potential exploitation by malicious actors.
Steps to Reproduce:
Navigate to the Alwaysdata.com login page. Enter valid login credentials (email and password). Intercept the login request using a tool such as Burp Suite. Analyze the intercepted request to observe that the email and password are transmitted in plain text or with minimal obfuscation, while the CSRF token is encrypted.
Impact:
Unauthorized Access: Attackers can intercept and extract user credentials, potentially leading to unauthorized access to user accounts and sensitive information. Account Takeover: Malicious actors can exploit the vulnerability to gain unauthorized control over user accounts, posing a risk to the security and privacy of affected users. Data Breach: The transmission of credentials in plain text exposes users' sensitive information to interception, increasing the risk of data breaches and privacy violations.
Severity:
The severity of this vulnerability is considered critical due to the potential for unauthorized access, account takeover, and data breaches. It undermines the security and trustworthiness of the Alwaysdata.com platform and poses significant risks to its users. Recommendation for Mitigation: To mitigate this vulnerability, I recommend the following actions:
Implement HTTPS encryption for all pages, especially those involving sensitive operations like login. Ensure that all user credentials, including email and password, are transmitted securely using encryption techniques such as TLS. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to enhance the security of user accounts. Conduct regular security assessments and audits to identify and address vulnerabilities in the platform's security controls. I believe that addressing this vulnerability promptly is crucial to ensuring the security and privacy of users' accounts and sensitive information on the Alwaysdata.com platform. I am available to provide further assistance or clarification on this matter if needed.
Thank you for your attention to this report, and I look forward to your prompt response and actions to address this vulnerability.
Sincerely, Neel Shukla Shuklaneel525@gmail.com
|
|
22 | Vulnerability Report: Unverified Email Registration on ... | Closed | 31.01.2024 |
Task Description
I am writing to report a security vulnerability that I discovered on the Alwaysdata.com platform regarding unverified email registration. This vulnerability allows users to create new accounts without verifying their email addresses, posing a significant risk to the security and integrity of the platform and its users.
Below are the details of the vulnerability along with steps to reproduce, its impact, severity, and proposed solution:
Vulnerability Details:
Vulnerability Type: Unverified Email Registration Website: https://www.alwaysdata.com/ Steps to Reproduce:
Visit the Alwaysdata.com website. Navigate to the account registration page. Enter any email address (valid or invalid) without going through email verification. Complete the registration process without receiving or verifying any email confirmation. Impact:
Account Takeover: Malicious actors can create accounts using others' email addresses and gain unauthorized access to their accounts or personal information. Spam and Abuse: Unverified accounts can be used to send spam, phishing emails, or engage in other abusive activities on the platform. Impersonation: Attackers can impersonate legitimate users or organizations by creating accounts with their email addresses.
Proposed Solution: To mitigate this vulnerability, I recommend implementing email verification as a mandatory step during the registration process. This would involve sending a verification email with a unique code or link that users must confirm before their accounts are activated.
Additionally, consider implementing rate limiting or other measures to prevent abuse of the registration process and ensure that users' accounts and data are protected from unauthorized access and misuse.
I believe that addressing this vulnerability promptly will help enhance the security and trustworthiness of the Alwaysdata.com platform and protect its users from potential harm.
Please let me know if you require any further information or assistance in resolving this issue. I am committed to assisting you in any way possible to ensure the security of the platform and its users.
Thank you for your attention to this matter, and I look forward to your prompt response.
|
|
21 | Bug Bounty Report | Closed | 04.02.2024 |
Task Description
Summary: A potential security vulnerability has been identified in the user invitation token generation process when integrated with a third-party service. This vulnerability could lead to the leakage of user invitation tokens, potentially exposing sensitive information and compromising the security of user accounts.
Details: Vulnerability Type: Information Disclosure Affected Component: User invitation token generation integrated with third-party service Severity: High Description: During our security assessment, it was discovered that the user invitation token, which is generated as part of the user invitation process, is not adequately protected when interacting with a third-party service. This oversight allows unauthorized access to the token, leading to potential exposure of sensitive information.
Steps to Reproduce: 1.Login into the account. 2.Go to the invite user function and add the email which you want to invite. 3.A token is received to that email for joining the team. 4.Keep your proxy on and click on the invitation link. 5.Set the password and you have successfully joined the team. 6.Now go back to your burp suite and search for the invitation token which is received on the step3. 7.You will notice that the token got leaked into third parties also.
Impact: If exploited, this vulnerability could allow an attacker to gain unauthorized access to user accounts, potentially leading to data theft, unauthorized access to sensitive information, and other malicious activities.
Recommendations for Mitigation:
Token Encryption: Implement encryption mechanisms to protect user invitation tokens during transmission to and from the third-party service. Secure Transmission: Ensure that communication channels between your system and the third-party service are secure, using protocols such as HTTPS. Token Expiry: Implement token expiration mechanisms to limit the window of opportunity for exploitation. Audit Access Logs: Regularly audit access logs for any suspicious activities or unauthorized access.
Proof of Concept (PoC): Include relevant information or details demonstrating the vulnerability, ensuring that no sensitive information is disclosed in the report.
I appreciate your prompt attention to this matter and look forward to working collaboratively to address and resolve this security vulnerability.
Thank you.
Aditya
|
|
20 | Unauthorized Access to Over 6000+ Valid User Credential ... | Closed | 30.01.2024 |
Task Description
I have identified a Credential Dump that allows unauthorized access to over 6000+ valid user credentials of Alwaysdata.com. This discovery was made in accordance with the Alwaysdata Bug Bounty Program guidelines. I am reporting this issue to ensure the security and privacy of Alwaysdata's users and to assist in prompt remediation.
Sensitive Data at Risk:
The data exposure includes, but is not limited to, vendor and client details, Personally Identifiable Information (PII), Social Security Numbers, medical and financial records, and crucial authentication credentials.
Impact
If exploited by a malicious actor, this vulnerability could lead to:
-Unauthorized access to user accounts. -Potential compromise of sensitive personal and financial data. -Secondary attacks using the obtained credentials (credential stuffing, phishing, etc.). -Damage to the reputation and trustworthiness of the Alwaysdata platform.
Given the scale of the data exposure (6000+ user credentials), the impact is considered highly critical.
Steps to Reproduce :
To access and reproduce the findings related to the data leak, please follow this link: https://phonebook.cz/. It is important to note that an Academia account is required to view the full extent of the data dump. This platform was where I initially discovered the leak of valid credentials.
For your convenience,I've completed the data compilation myself and attached screenshots that capture key aspects of the data leak. Please find below,The attached document containing direct links to the accounts, along with their corresponding emails and passwords. This information was extracted through a manual process, and I've managed to identify at least 30 potential accounts, reviewing their Personally Identifiable Information (PII) among other data.These images should provide a clearer understanding of the issue and assist in verifying the vulnerability.
Proof of Concept I have attached POC for your reference.I was only able to attach 5 files. If possible,kindly guide me so I can attach more POC's
Remediation Suggestions
To address this vulnerability, I suggest the following immediate and long-term remediation steps: Revoking current exposed credentials and enforcing a password reset for affected users. Implementing stricter access controls and regular security audits to prevent similar vulnerabilities.
Confidentiality Agreement
I understand the sensitive nature of this report and agree to keep the details confidential until Alwaysdata has resolved the issue and agreed to disclosure, as per the bug bounty program's guidelines.
I look forward to your prompt response and am willing to provide any further information required for the resolution of this issue.Though the leaked credentials might originate from another application or service,they are your Users and I believe,it is your call to protect the privacy and data of your users.I would greatly appreciate your team's consideration of rewarding this finding, even if it falls outside the typical scope of your program. Thank you for your commitment to security and the opportunity to contribute to the safety of the Alwaysdata platform.
Regards, Bad_Script3r Would really appreciate if you could revert on my Email (akhilsocials@gmail.com) Thanks and Regards.
|
|
19 | User Enumeration Through Forgot Password Vulnerability | Closed | 29.01.2024 |
Task Description
The application's "Forgot Password" feature allows user enumeration. This is because the application responds with a different message depending on whether the submitted email address is registered or not. (https://admin.alwaysdata.com/password/lost/)
steps to Reproduce:
Access the "Forgot Password" page. Enter a random, non-registered email address. Submit the request. Observe the response message:
the message states "There is no account with this email address," which means that user enumeration is possible.
An attacker could exploit this vulnerability to:
Gather a list of valid user email addresses. Launch targeted phishing attacks. Use the information to attempt password guessing or brute force attacks
Remediation: Implement Generic Response: The application should provide the same response message regardless of whether the email address is registered or not. This prevents attackers from differentiating between valid and invalid accounts.
Additional Notes:
i am aware that this bug is not eligible for a bounty but wanted to bring it to the team's attention.
Best Wishes -Basil
|
|
18 | .git file exposed | Closed | 18.01.2024 |
Task Description
Hello support teams,
I hope this email finds you well. I am Devansh.I am a security researcher and I am writing to bring to your attention a security vulnerability that I have discovered on your website.
Report of bug is as follows:
Vulnerability name: .git file exposed
Website : https://security.alwaysdata.com/.git/config
Overview of the Vulnerability
The danger occurs when the application leaves the “. git” directory, which is in the system root, exposed. By carelessness, an application that uses Git for versioning can expose the “. git” directory.
Steps to Reproduce
1. open this website in the browser https://cdn.anscommerce.com/.git/config
2. you can see the git file is open
3 .by the dotgit extension you can download the git file
It can be exploited more but may cause harm to your website
Impact of the vulnerability
git folder is required to log every commit history and every other information required for your remote repository, version control, commits etc. These things are saved in different folders which have different meanings. Once the folder is created, open it and see the
References :
https://medium.com/stolabs/git-exposed-how-to-identify-and-exploit-62df3c165c37
https://www.acunetix.com/vulnerabilities/web/git-detected/
Please consider this as an urgent matter and prioritize the resolution of this vulnerability . if you require any additional information or assistance. Do let me know
Thank you for your attention to this matter, and I look forward to hearing from you soon.
Regards Devansh
|
|
17 | Lack of password confirmation on account deletion | Closed | 19.01.2024 |
Task Description
Hello support teams, I hope this email finds you well. I am Devansh . I am a security researcher and I found a vulnerability in your website.
bug name : Lack of password confirmation on account deletion
Description: the user account can be deleted without confirming user password or re authentication. The removal of an account is one of the sensitive parts of any application that needs to be protected, therefore removing an account should validate the authenticity of the legitimate user.
steps to reproduce:
1. Go to account settings and click on delete account.
2. There will be a next page where I click on delete my account now option.
3. You will see the message of account has been deleted and get logged out
Remediation: System must confirm authentic user before performing such task. A link can be sent to the user email id that can be used for delete operation. Otherwise user password should be provided to the application to confirm the entity identity.
It seems to be of very low impact,but consider a situation when a user forgets to logout from his account or someone gets access to his phone and deletes the account. This situation is more severe than account takeover as there is no way to get an account again. All the save information and data including previous record, card information etc can be deleted.
video poc is attached
Thanks and regards Devansh
https://
|
|
16 | Unauthenticated-Video conferencing on "https://jitsi.al ... | Closed | 18.01.2024 |
Task Description
Description: while Enumerating subdomains of Alwaysdata.com, I Found a subdomain open hosting video conferencing for all.
Steps to reproduce: 1.visit the site :"https://jitsi.alwaysdata.com/" 2.create a video conferencing :"malicious.conferencing" 3.Now anyone can join the video call with the link provided by the attacker.
This could lead to potential damage to the Alwaysdata if the attacker intends to exploit this in a malicious way. as this is open for any users on the web.
Impact: 1.Unauthorized Access:
Vulnerability: If the video conferencing system is not properly secured, it may be susceptible to unauthorized access. Impact: Unauthorized individuals could join sensitive meetings, leading to the potential exposure of confidential information.
2.Phishing Attacks: Vulnerability: Attackers may exploit the subdomain for phishing attacks, tricking users into providing sensitive information. Impact: This could lead to the compromise of user credentials or the installation of malware on participants' devices.
3.Data Storage Security:
Vulnerability: Inadequate security measures for storing recorded video conference sessions. Impact: Stored data may be at risk of unauthorized access, leading to the exposure of sensitive information.
POC: https://drive.google.com/file/d/17NnRxFnzj7gZFsLXNEzt28b4jYjW7c-d/view?usp=sharing
Mitigation: To mitigate these risks, Alwaysdata should implement strong authentication, encrypt communication channels.
|
|
15 | Bug Bounty|User credential Leaked on Github-dork | Closed | 18.01.2024 |
Task Description
Description: A User's credential was leaked on github-dork.This will give potential insights to user's sensitive infos if any.
Steps to Reproduce: 1.github dork "admin.alwaysdata.com password" 2.visit this Repo:"https://github.com/AndryAurelian101/PHP-project/blob/b3b26287837a34ecb75da46e90ebf01c919d0c1e/www/db_connect.php" 3.you could see the credential are leaked.
I was able to login into the user's credential for verification.
Impact: Information disclosure
Mitigation: Redacting the credentials
|
|
14 | Potential SSRF Vulnerability via Self-XSS | Closed | 18.01.2024 |
Task Description
Description:
During a penetration testing process, I discovered a Self-XSS vulnerability on the page https://https://admin.alwaysdata.com/site/resolver/. This vulnerability has the potential to escalate into a Server-Side Request Forgery (SSRF) attack, allowing attackers to make unauthorized requests from the server. This poses risks such as data breaches and potential compromise of internal systems.
While the initial exploitation may require self-XSS, the underlying issue of unvalidated user input leading to SSRF is a critical vulnerability that must be addressed.
Steps To Reproduce:
Step 1 : Open BurpSuite.
Step 2 : Navigate to the following link in a web browser https://admin.alwaysdata.com/site/resolver/ Capture the traffic.Paste the payloads into the intercepted Request Body.
Payload 1:
{"addresses":["<script>alert(document.domain);</script>"]}
(This payload triggers an alert displaying the value of document.domain.)
Payload 2:
{"addresses":["<img src=http://ox7dn3y4fsbqfkyzmmb5alv7i.odiss.eu/>"]}
(This payload makes unauthorized requests from the server.)
The second payload initiates unauthorized requests from the server. In the above payloads, I utilized OAST to examine the responses.
Impact:
Attackers could steal sensitive information stored on the server. By crafting malicious URLs, attackers could gain access to internal network resources that are not publicly accessible.
|
|
13 | Lack of Verification Email | Closed | 16.01.2024 |
Task Description
Description:
The website lacks proper email verification.During the user registration process,it only sending a greeting email upon registration. The absence of email verification could lead to create unverified accounts and host content with any email address, potentially poses a serious security risk.
Impact :
The absence of email verification poses a significant security risk, allowing the potential use of any email address for registration on a hosting site without proper authentication. This could lead to the creation of accounts under false identities, enabling malicious actors to host illegal content anonymously.
The free hosting service, which doesn't require valid details, may be exploited for unauthorized activities, emphasizing the need for robust email verification procedures to ensure account legitimacy and prevent abuse like.
Spam distribution
Phishing campaigns
Distribution of illegal or harmful content
Reputational damage to the platform
So, I am Reporting this issue to the platform's security team for addressing the vulnerability and enhancing overall security.
|
|
12 | No rate limit on Submit tickets | Closed | 15.01.2024 |
Task Description
Hi team, iam an ethical hacker, web application penetration tester and bug bounty hunter. I found a new Vulnerability So iam reporting it to you now.
Vulnerability: No rate limit on Submit tickets
Description: I have identified a vulnerability in the organization's Submit tickets system, where the request to Submit tickets has no rate limit.
To reproduce this issue, follow the steps below: Step 1: Go to the organization's website: https://admin.alwaysdata.com/support/add/ Step 2: fill the form by typing "1" in the "subject" section and type "2" in the Message" section and intercept the request using Burp Suite. Step 3: Send this request to Intruder and make the payload on "1" that belongs to "subject" section then go to payloads and add numbers from 2 to 20. Step 4: then start the attack. Step 5: Observe that the 20 tickets send to support. Please see my attached screenshots too.
This demonstrates that the vulnerability allows for mass tickets or tickets bombing to the organization, which is detrimental to business operations.
Impact: 1- Increased Load on Servers: Without a rate limit, there could be a significant increase in the number of requests to the server, which could lead to excessive load. 2- Vulnerability to Attacks: It could make the organization more vulnerable to attacks such as Denial of Service (DoS). In a DoS attack, an attacker could flood the system with requests, consuming too much network capacity, storage, and memory. 3- Compromised User Experience: If the server is overwhelmed with requests, it could slow down the system for legitimate users.
I used an email address "haneenibra5566@gmail.com".com", You can check the tickets that have sent from it. I made the above scenario with this email address.
Solution: To mitigate this vulnerability, it is recommended to implement additional security measures such as adding a CAPTCHA or implementing rate limiting on the invitation endpoint. By adding these measures, the organization can prevent malicious users from exploiting the system and protect the business and its users from the negative consequences of mass mailing attacks.
I hope my report will keep you in safe
|
|
2 | XSS Vulnerability in [admin.alwaysdata.com] Support Tic ... | Closed | 12.01.2024 |
Task Description
XSS Vulnerability in [admin.alwaysdata.com] Support Ticket System
Vulnerability Report Greeting: Dear Team
I'm writing to report a critical Reflected Cross-Site Scripting (XSS) vulnerability discovered in your [admin.alwaysdata.com] application. This vulnerability allows attackers to inject malicious JavaScript into the application, potentially compromising user accounts and sensitive data.
PoC: By sending a specially crafted request containing the payload redhet"'><script>prompt(document.domain)</script> through the add_participants parameter in the support ticket creation form, we can trigger the XSS vulnerability and execute arbitrary JavaScript in the victim's browser.
Summary:
A reflected XSS vulnerability has been identified in the "add_participants" parameter of the support ticket creation form on admin.alwaysdata.com. This vulnerability allows attackers to inject malicious JavaScript code that will be executed in the victim's browser when they view a vulnerable page.
Vulnerability Details:
Type: Reflected XSS (OWASP A4)
Exploit: Injecting malicious JavaScript through a vulnerable request parameter
Vulnerable URL: https://admin.alwaysdata.com/support/add/
Vulnerable Request: POST /support/add/
Vulnerable Endpoints: The add_participants parameter in the support ticket creation form
Payload: redhet"'><script>prompt(document.domain)</script>
This parameter is used to add participants to a support ticket, but it is not properly sanitized, allowing attackers to inject arbitrary code that will be executed in the browser of any user who views the vulnerable ticket.
## Impact Assessment
1. Impact one: Information Disclosure: The attacker can steal sensitive user information, such as cookies or session IDs, by executing malicious JavaScript within the victim's browser.
2. Impact two: Account Takeover: The attacker could potentially hijack user accounts by tricking them into executing malicious code that grants unauthorized access.
3. Impact three: Defacement: The attacker could manipulate the content displayed on the application by injecting malicious JavaScript that alters the user interface.
## Recommendations
1. Step one: Immediately sanitize all user input: Implement strict input validation and sanitization procedures to prevent the injection of malicious code. This includes escaping special characters and enforcing a Content Security Policy (CSP).
2. Step Two: Patch vulnerable software: Update all relevant software to the latest versions to address known vulnerabilities.
3. Step three: Consider additional security measures: Implement a web application firewall (WAF) to further protect against XSS attacks.
4. Step four:Regularly scan for vulnerabilities: Conduct regular penetration testing and vulnerability scans to identify and address potential security issues.
Impact:
Execution of arbitrary JavaScript code in the victim's browser Potential for session hijacking, credential theft, or other attacks
## Steps to Reproduce
1. Step one: Access the support ticket creation form at https://admin.alwaysdata.com/support/add/
2. Step two: Enter the following payload in the "add_participants" field: redhet"'><script>prompt(document.domain)</script>
3. Step three: Submit the form.
4. Final step: Observe that the JavaScript code is executed, displaying a prompt with the domain name. (cookies)
Attachments PoC Video: [Link to video demonstrating the vulnerability]**
## References
[OWASP XSS Prevention Cheat Sheet]: (https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html)
[OWASP XSS Testing Guide]: (https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting)
I hope you will give me a good answer!!
If you have any questions, feel free to ask them ;)
Thank You,
Regards, Redhet
|