Loading HuntDB...

Internal API endpoint is accesible for everyone

Medium
W
WHO COVID-19 Mobile App
Submitted None
Reported by arnonymous

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
## Summary: It looks like the endpoint **/internal/cron/refreshCaseStats** as configured in [cron.yaml] (https://github.com/WorldHealthOrganization/app/blob/master/server/appengine/src/main/webapp/WEB-INF/cron.yaml#L3) is accesible for everyone. Since it is configured as a cronjob to run every 5 minutes and starts with internal, this should not be the case, and could worst case lead to DoS if it's a costly operation. ## Steps To Reproduce: 1. Go to https://hack.whocoronavirus.org/internal/cron/refreshCaseStats ```time curl -v https://hack.whocoronavirus.org/internal/cron/refreshCaseStats``` {F1130894} Show that it takes about 20 seconds, before a 200 OK response returns (with a single request). ## Supporting Material/References: https://github.com/WorldHealthOrganization/app/blob/master/server/appengine/src/main/webapp/WEB-INF/cron.yaml#L3 ## Impact Depending on the impact / performance of the action 'refresh case stats' this could lead to unnecesarry load on the backend (and charges) or even DoS.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic