Loading HuntDB...

Full access to any list

I
Instacart
Submitted None
Reported by sameoldstory

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
Overview == The endpoint for adding a list collaborator lacks authorization checks. A regular Instacart user can add themselves as a collaborator to any list and thus get full control over that list. How to Reproduce == 1. Choose a list that you want to edit, for example the one with id = 10. 2. Log in to Instacart. 3. Copy the cookie and anti-CSRF headers from one of the requests. 4. Send a request: ``` POST /api/v2/list_users Host: www.instacart.com Content-Type: application/json Cookie: ... X-CSRF-Token: ... {"list_user":{"list_id":10,"email":"[email protected]"}} ``` 5. Open `https://www.instacart.com/api/v2/lists/10` in browser and grab the list's token (`7bHoerQ` in this case). 6. Open `http://www.instacart.com/store/giant/lists/7bHoerQ/edit` in browser and do whatever you want to the list. Proof of Concept == ``` GET https://www.instacart.com/api/v2/lists/10 {"meta":{"code":200},"data":{"id":10,"name":"Test sameoldstory" ... ``` Security Implications == This vulnerability can be used to: * See metadata of a private list. * See the personal name of a list owner, even if they chose to hide it. * Change metadata and items or even delete any list. * Affect product promotion by messing with popular lists. * Perform website defacement and phishing attacks. * Enhance stored XSS attacks by embedding them into the popular lists.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$150.00

Submitted

Weakness

Privilege Escalation