Reflected File Download attack allows attacker to 'upload' executables to hackerone.com domain

Disclosed: 2015-04-16 10:21:21 By rickypaipie To security
Unknown
Vulnerability Details
Hi hackerone team, I'm a friend of Peiying and am looking for a position at hackerone. While playing around with your product, I found a serious vulnerability in your application: it allows attackers to craft executables on the hackerone.com domain rather than the sandboxed one on S3. 1. attacker reports a bug titled `hackerone\"||calc||` 2. attacker can then direct victim to [https://hackerone.com/notifications.bat](https://hackerone.com/notifications.bat) 3. when downloaded and executed, it will open calculator on victim's windows environment The potentials of this vector is outlined in [Reflected File Download: A New Web Attack Vector](https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/), which does not limit to executing commands on victim's machines. To fix, since hackerone is a Rails deployment, at the rendering step of the notifications action: instead of: `render json: notifications` do: respond_to do |format| format.json do render json: notifications end end so requests of non-json formats would return a 406 Not Acceptable. see [respond_to](http://apidock.com/rails/ActionController/MimeResponds/InstanceMethods/respond_to). Look forward to hearing back from you soon, Ricky
Actions
View on HackerOne
Report Stats
  • Report ID: 50658
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report