uber.com may RCE by Flask Jinja2 Template Injection

Disclosed: 2016-04-06 21:15:11 By orange To uber
Unknown
Vulnerability Details
Hi, Uber Security Team I found an RCE in rider.uber.com. First, if you change your profile name to {{ '7'*7 }}, and you will receive a mail "Your Uber account information has been updated" sent by [email protected] And in mail body, you can see your name become '7777777' This is a vulnerability about Flask Template Engine(Jinja2) Injection , more detail can be seen in these blogs https://nvisium.com/blog/2016/03/09/exploring-ssti-in-flask-jinja2/ https://nvisium.com/blog/2016/03/11/exploring-ssti-in-flask-jinja2-part-ii/ I think it can be a Remote Code Execution vulnerability but there is a length limit :( But I still can "write" some Python code in "name" filed, there are more examples in attachments and bellow are my payloads {{ '7'*7 }} {{ [].__class__.__base__.__subclasses__() }} # get all classes {{''.__class__.mro()[1].__subclasses__()}} {%for c in [1,2,3] %}{{c,c,c}}{% endfor %} ... Thanks for your patience for reading my report. : )
Actions
View on HackerOne
Report Stats
  • Report ID: 125980
  • State: Closed
  • Substate: resolved
  • Upvotes: 112
Share this report