Authorization bypass -> IDOR -> PII Leakage
High
Vulnerability Details
Hi team!
During testing ████ I found javascript file containing administrative panel functionality.
It is accessible at:
https://████/█████████
In this file I found an end point responsible for returning data about applications of the website users to the website administrators.
The returned data contains PII data (Full name, phone and email) of military personnel, and or their family members.
## References
Steps to reproduce:
Run following curl command to retrieve data:
curl https://███/███ -X POST -data="url=%2F████████" -k
Modifying ██████████ parameter result in different Application being returned.
I have tested retrieving following ids: █████.
Trying to retrieve record 60000 returns no information, so maybe ~50000 applications are accessible.
## Impact
PII leak of military personnel and family members
## System Host(s)
█████████
## Affected Product(s) and Version(s)
/█████████
## CVE Numbers
## Steps to Reproduce
Run following command to retrieve data:
curl https://███████/███ -X POST -data="url=%2F████████" -k
Modifying ██████ parameter result in different Application being returned.
I have tested retrieving following ids: ███.
Trying to retrieve record 60000 returns no information, so maybe ~50000 applications are accessible.
## Suggested Mitigation/Remediation Actions
1. admin.js should be available only after Administrator successfully logs in
2. all administrative end points must check if authorized administrator is requesting them
Actions
View on HackerOneReport Stats
- Report ID: 1489470
- State: Closed
- Substate: resolved
- Upvotes: 5