Loading HuntDB...

Server-side request forgery (ssrf)

Medium
Y
Yelp
Submitted None
Reported by raja404

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
*.yelp-support.com ## Summary: Server-side request forgery ## Platform(s) Affected: www.yelp-support.com ## Steps To Reproduce: 1. If you visit this site, attackers could try to steal information like your passwords, emails, or credit card details. 2. your server has redirect to malicious website 3. i am Referer: https://evil.com/ and your don't check server properly the write website #Steps 1 . i am open assetfinder to subdomain enumeration on this domain : yelp-support.com 2. i am open in this subdomain in Burp suite : www.yelp-support.com 3. my Browser Request: GET /static/111213/js/perf/stub.js HTTP/1.1 Host: www.yelp-support.com Cookie: CookieConsentPolicy=0:1; LSKey-c$CookieConsentPolicy=0:1 Sec-Ch-Ua: "Chromium";v="105", "Not)A;Brand";v="8" Sec-Ch-Ua-Mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36 Sec-Ch-Ua-Platform: "Linux" Accept: */* Sec-Fetch-Site: same-origin Sec-Fetch-Mode: no-cors Sec-Fetch-Dest: script #Referer: https://evil.com/ --------- i am change this link ------ Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Connection: close 4. and your server Response: HTTP/1.1 200 OK Date: Mon, 26 Sep 2022 08:14:39 GMT Content-Type: application/x-javascript Connection: close Strict-Transport-Security: max-age=63072000; includeSubDomains Cache-Control: public,max-age=10368000 Expires: Tue, 24 Jan 2023 08:14:39 GMT Last-Modified: Thu, 18 Dec 2014 19:28:42 GMT Vary: Accept-Encoding Server: sfdcedge X-SFDC-Request-Id: 78779c5a3d8ac507638c3b6c783c3ce8 Content-Length: 1385 this["Perf"]&&void 0!==this["Perf"].enabled||(function(window){'use strict';var a={DEBUG:{name:"DEBUG",value:1},INTERNAL:{name:"INTERNAL",value:2},PRODUCTION:{name:"PRODUCTION",value:3},DISABLED:{name:"DISABLED",value:4}}; window.PerfConstants={PAGE_START_MARK:"PageStart",PERF_PAYLOAD_PARAM:"bulkPerf",MARK_NAME:"mark",MEASURE_NAME:"measure",MARK_START_TIME:"st",MARK_LAST_TIME:"lt",PAGE_NAME:"pn",ELAPSED_TIME:"et",REFERENCE_TIME:"rt",Perf_LOAD_DONE:"loadDone",STATS:{NAME:"stat",SERVER_ELAPSED:"internal_serverelapsed",DB_TOTAL_TIME:"internal_serverdbtotaltime",DB_CALLS:"internal_serverdbcalls",DB_FETCHES:"internal_serverdbfetches"}};window.PerfLogLevel=a;var b=window.Perf={currentLogLevel:a.DISABLED,mark:function(){return b},endMark:function(){return b},updateMarkName:function(){return b},measureToJson:function(){return""},toJson:function(){return""},setTimer:function(){return b},setServerTime:function(){return b},toPostVar:function(){return""},getMeasures:function(){return[]},getBeaconblocked:function(){return null},setBeaconblocked:function(){},clearBeaconblocked:function(){},removeStats:function(){},stat:function(){return b},getStat:function(){return-1}, onLoad:function(){},startTransaction:function(){return b},endTransaction:function(){return b},updateTransaction:function(){return b},isOnLoadFired:function(){return!1},util:{setCookie:function(){}},enabled:!1};})(this); 5. successfully redirect to your server ## Supporting Material/References: 1. assetfinder 2. Burp suite ## Impact 1. If you visit this site, attackers could try to steal information like your passwords, emails, or credit card details. 2. your server has redirect to malicious website 3. i am continue to visit this so your server will crash 4. your website access to malicious website

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Server-Side Request Forgery (SSRF)