Bypassing Garbage Collection with Uppercase Endpoint

Disclosed: 2023-10-04 10:37:25 By h1xploit To indrive
Unknown
Vulnerability Details
## Summary: This report highlights a vulnerability in the garbage collection process, where the endpoint "/metrics" can be bypassed by using uppercase letters. Additionally, it is important to note that if your system contains similar endpoints, they might also be susceptible to the same bypass method. This report aims to provide comprehensive information about the vulnerability and its potential impact. ## Steps To Reproduce: 1. Make an HTTP request to the URL: https://injob.indriver.com/api/metrics - ```curl -X GET "https://injob.indriver.com/api/metrics" -H "Content-Type: application/json"``` - Observe the response, which is expected to be "forbidden" (HTTP 403). - {F2523755} 2.Make another HTTP request to the URL: https://injob.indriver.com/api/METRICS - ```curl -X GET "https://injob.indriver.com/api/METRICS" -H "Content-Type: application/json"``` - Observe the response, which is expected to be "success" (HTTP 200). - {F2523756} ## Impact The impact of this vulnerability includes unauthorized access to sensitive information or resources, potential data manipulation, and a potential risk of further escalation in the system. Furthermore, if other endpoints with similar patterns exist in your system, they might also be vulnerable to the same bypass method, exposing the system to additional security risks.
Actions
View on HackerOne
Report Stats
  • Report ID: 2078527
  • State: Closed
  • Substate: resolved
  • Upvotes: 32
Share this report