IDOR Leads To User Profile Modification https://mtnmobad.mtnbusiness.com.ng/app/updateUser

Disclosed: 2024-09-18 23:21:51 By reachaxis To mtn_group
Critical
Vulnerability Details
## Summary: Hello Team, https://mtnmobad.mtnbusiness.com.ng/app/updateUser allows authenticated users to alter their account profile. But, however, there is no authorization check when updating another user's profile thus, allowing attacker to modify anyone's profile info such as `Username, Address, Mobile Number, Company Name and Company Size` ## Steps To Reproduce: ## Requirements: Create two Test Accounts (Attacker & Victim) Login into attacker's account In Mozilla Firefox at https://mtnmobad.mtnbusiness.com.ng/#/login1. 1. Visit https://mtnmobad.mtnbusiness.com.ng/#/userProfile 2. Goto to Burp and turn Intercept is on to capture request. 3. Locate this endpoint `POST /app/updateUser HTTP/1.1` while still proxying traffic through Burp. Notice, json blob data being presented. 3. Record `"id":"/###", "email":"[email protected]"` for attacker's account and Logout. 4. Now, Login into victim's account and repeat step [1, 2 & 3] and Logout. ## Attack Steps Login into attacker's account in Mozilla Firefox and Victim's Account in Google Chrome. 1. Using attacker's account in Firefox, visit https://mtnmobad.mtnbusiness.com.ng/#/userProfile and capture request with Burp. 2. Switch attacker's "id":"/redacted", "email":"[email protected]" to victim "id":"/redacted" "email":"[email protected]" and forward request. 3. Go to victim's account in google chrome and refresh the page. 4. Visit victim's profile and notice, attacker has successfully updated the user's Profile without their knowledge. ## Recommendation/Remediation: Implement stringent authorization controls to make sure a user has the necessary rights before allowing them to make such a harmful request on another account. Generate random `userIds` to prevent attacker from predicting such `userIds`. ## Supporting Material/References: Video: {F1957836} ## Screenshots: Before: {F1957817} ## After: {F1957834} * [attachment / reference] ## Tools BurpSuite Community Edition: [v2022.8.4] Morzila Firefox: 105.0.1 (64-bit) Google Chrome: Version 105.0.5195.127 (Official Build) (64-bit) OS: Microsoft Windows [Version 10.0.22000.856] ## Impact An attacker will be able to use this technique to change any user's (advertiser's) profile, for example, a company name and phone number under the attacker's control to commit a crime entirely in the victim's name. Regards! @v3rvain0001
Actions
View on HackerOne
Report Stats
  • Report ID: 1714638
  • State: Closed
  • Substate: resolved
  • Upvotes: 63
Share this report