bypassing dashboard without account + Information disclosure trough websockets
High
Vulnerability Details
**Sumarry :**
I found a information disclosure for bypassing parameter url attacker can redirect to dashboard without login user/pass page
and websocket can be exposed in response/dashboard.
**URL Effected**
https://support.nextcloud.com/#password_reset
### Steps To Reproduce:
* Opened directory at https://support.nextcloud.com/#password_reset
* Forget-password and repeat url to burp-suite
* In directory added a parameter bypass is ``//%0d%0aSet-Cookie:%20crlf-injection=mickeybrew//``
* and look a responsive , you can be redirect to dashboard panel without user/pass
* Show the ``network-browser`` and you can found api directory and websocket
* Directory websocket is https://support.nextcloud.com/api/v1/signshow
* Opened it and **Boom** You can see Information disclosure through websocket
**Request**
```
GET #password_reset/%0d%0aSet-Cookie:%20crlf-injection=mickey HTTP/1.1
Host: support.nextcloud.com
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Length: 91
```
### Screenshots POC
█████
██████
███████
███
## Impact
It may cause the attacker to log into the dashboard page without logging in via user/pass, and the attacker finds sensitive files on open fires.
Actions
View on HackerOneReport Stats
- Report ID: 1102780
- State: Closed
- Substate: informative
- Upvotes: 6