Bypassing Garbage Collection with Uppercase Endpoint
I
inDrive
Submitted None
Team Summary
Official summary from inDrive
Subscribe to our telegram channel with updates https://t.me/indrive_bbp
Actions:
Reported by
h1xploit
Vulnerability Details
Technical details and impact analysis
## Summary:
This report highlights a vulnerability in the garbage collection process, where the endpoint "/metrics" can be bypassed by using uppercase letters.
Additionally, it is important to note that if your system contains similar endpoints, they might also be susceptible to the same bypass method. This report aims to provide comprehensive information about the vulnerability and its potential impact.
## Steps To Reproduce:
1. Make an HTTP request to the URL: https://injob.indriver.com/api/metrics
- ```curl -X GET "https://injob.indriver.com/api/metrics" -H "Content-Type: application/json"```
- Observe the response, which is expected to be "forbidden" (HTTP 403).
- {F2523755}
2.Make another HTTP request to the URL: https://injob.indriver.com/api/METRICS
- ```curl -X GET "https://injob.indriver.com/api/METRICS" -H "Content-Type: application/json"```
- Observe the response, which is expected to be "success" (HTTP 200).
- {F2523756}
## Impact
The impact of this vulnerability includes unauthorized access to sensitive information or resources, potential data manipulation, and a potential risk of further escalation in the system. Furthermore, if other endpoints with similar patterns exist in your system, they might also be vulnerable to the same bypass method, exposing the system to additional security risks.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved