IDOR at https://demo.sftool.gov/TwsHome/ScorecardManage/ via scorecard name
High
Vulnerability Details
Hi Team,
I have found a broken access control vulnerability on https://demo.sftool.gov/ under your /tws directory.
I made two accounts.
One account i browsed to /tws and created a new scorecard. Here i can submit all information I need. The scorecard name is in the end of the URL https://demo.sftool.gov/TwsHome/ScorecardManage/testdsfdfsf
I logged out this account
I logged into attacker account. I browse to https://demo.sftool.gov/TwsHome/ScorecardManage/testdsfdfsf (the last part is the name of the other accounts score card). I can now view the scorecard and even edit the score card from the attackers account. I can add accounts to read only and edit permissions on the score card and change information as-well as download the score card.
Log back into the victim account and the scorecard information has been changed, downloaded and attacker has assigned permissions.
We can brute force scorecard names but i am not doing this as the above on my accounts already shows the issue.
Many thanks
Holla
## Impact
An attacker can read, edit and download and assign permissions to another users scorecard.
Actions
View on HackerOneReport Stats
- Report ID: 1472721
- State: Closed
- Substate: resolved
- Upvotes: 7