xmlrpc.php is enabled - Nextcloud

Disclosed: 2020-03-01 13:20:04 By chintapakdamdam To nextcloud
Medium
Vulnerability Details
Hi Nextcloud Team, Summary: An attacker can devise a XML request to list all the methods that are enabled on the server. Replace Get with POST request and add method call in the request. To reproduce the vulnerability you need to use Firefox browser and Burpsuite Open: https://nextcloud.com/xmlrpc.php. This URL is publicly accessible, thus confirming the presence of the vulnerability. Proceed further in order to get request/response for above vulnerability. Capture the Get method in burpsuite tool Send the Get method in repeater tab. As "XML-RPC server accepts POST requests only" write POST instead of GET in Request window. Write the method list command below for Post request in Request window like: <?xml version="1.0" encoding="utf-8"?> <methodCall> <methodName>system.listMethods</methodName> <params></params> </methodCall> We will get all the available methods for https://nextcloud.com/xmlrpc.php Regards jaimaakali ## Impact Unauthorized Access
Actions
View on HackerOne
Report Stats
  • Report ID: 458696
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report