Loading HuntDB...

Bypassing Garbage Collection with Uppercase Endpoint

I
inDrive
Submitted None

Team Summary

Official summary from inDrive

Subscribe to our telegram channel with updates https://t.me/indrive_bbp

Reported by h1xploit

Vulnerability Details

Technical details and impact analysis

## Summary: This report highlights a vulnerability in the garbage collection process, where the endpoint "/metrics" can be bypassed by using uppercase letters. Additionally, it is important to note that if your system contains similar endpoints, they might also be susceptible to the same bypass method. This report aims to provide comprehensive information about the vulnerability and its potential impact. ## Steps To Reproduce: 1. Make an HTTP request to the URL: https://injob.indriver.com/api/metrics - ```curl -X GET "https://injob.indriver.com/api/metrics" -H "Content-Type: application/json"``` - Observe the response, which is expected to be "forbidden" (HTTP 403). - {F2523755} 2.Make another HTTP request to the URL: https://injob.indriver.com/api/METRICS - ```curl -X GET "https://injob.indriver.com/api/METRICS" -H "Content-Type: application/json"``` - Observe the response, which is expected to be "success" (HTTP 200). - {F2523756} ## Impact The impact of this vulnerability includes unauthorized access to sensitive information or resources, potential data manipulation, and a potential risk of further escalation in the system. Furthermore, if other endpoints with similar patterns exist in your system, they might also be vulnerable to the same bypass method, exposing the system to additional security risks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted