Attacker could setup reminder remotely using brute force

Disclosed: 2016-09-19 00:04:46 By cymtrick To uber
Unknown
Vulnerability Details
Hi, Attacker could setup the reminder for bulk no of amount of accounts using there phone no's. He could setup infinite no of reminders. Tried brute force for 100 times worked perfectly here is the link : https://widgets.uber.com/american-airlines-reminders/ Here any phone-no is accepted. Actually logged in user phone-no should be cross checked. TCP DUMP while setting up reminder: ``` POST /american-airlines-reminders/api/v1/reminders HTTP/1.1 Host: widgets.uber.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: application/json Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br X-CSRF-Token: x-uber-origin: web-reminders Content-Type: application/json Referer: https://widgets.uber.com/american-airlines-reminders/ Content-Length: 87 Cookie: Connection: keep-alive {"event":{"time":1470940200},"phone_number":"+919949111969","reminder_time":1470937500} ``` Send that request to intruder in burp and try to brute force. Setting up reminder is always shown with response code 200 . my reminder was setup on Thu, 11 Aug 2016 17:45:00 GMT multiple times. Attacker could perform this on multiple phone-no. This could issue for user's because their phone gets constantly notifications. Regards prashanth varma
Actions
View on HackerOne
Report Stats
  • Report ID: 158393
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 36
Share this report