Loading HuntDB...

Insecure ███████ credentials on staging app at ████ leads to application takeover

High
U
U.S. Dept Of Defense
Submitted None
Reported by skarsom

Vulnerability Details

Technical details and impact analysis

Insufficiently Protected Credentials
**Summary:** A ██████████ application called "████" has an old endpoint that accepts insecure/test ████████ credentials despite being a publicly-accessible IP. This endpoint also provides the ability to view information that may be FOUO, to exfiltrate information on registered personnel or contractors, to upload files, and to change configuration settings with ███████████████ privileges. **Description:** The IP address ███ points to a deployment of an application called ████/█████, which is a DoD-owned system on █████████). The login for this deployment accepts insecure ███ credentials (███). There is also an authentication/█████ panel accessible at https://██████████externally accessible with these credentials. The ████████ system available through this login includes file upload features, data exfiltration and management, workspace management, and infrastructure management. The ██████████ / authentication █████████istration system available through this login includes file import/export privileges, user management, RBAC management, HTTP header management, OAuth credential management, session management, and frankly anything else you can think of that would be in an ████████ panel. ████████ frontend: #███████ #██████ #█████ ███████ backend: #███ #█████████ #█████ #██████ #██████ ## Step-by-step Reproduction Instructions 1. Navigate to https://████ 2. Enter the username "██████" and the password "██████████" 3. After logging in, click "Launch" under ██████ 4. Navigate to https://███████████ 5. Enter the username "███" and the password "█████████" ## Product, Version, and Configuration (If applicable) ████████████ ███ Build Date: 25 November 2020 ## Suggested Mitigation/Remediation Actions 1. Immediately disable insecure ███████████████ credentials. 2. I would recommend preventing external access to the ████████ █████████ portal/requiring CAC as a best practice. ## Impact An unauthorized attacker can exfiltrate intelligence and personnel information stored in a staging █████/█████. An unauthorized attacker can modify, insert, and delete intelligence and personnel information stored in a staging ████████/███████. An unauthorized attacker can exfiltrate, modify, upload to, download from, and/or deny access to a staging ██████ environment through the ██████ ████ panel. I did not feel comfortable seeing whether I could escalate file uploads to an RCE before getting DOD consent.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insufficiently Protected Credentials