Loading HuntDB...

Root user disclosure in data.gov domain though x-amz-meta-s3cmd-attrs header

Low
G
GSA Bounty
Submitted None
Reported by sneakerz

Vulnerability Details

Technical details and impact analysis

Information Disclosure
I performed a GET request on Host www.data.gov in burp suite to a custom domain and the Response showed the x-amz-meta-s3cmd-attrs header with the user id as root and group id running as root. x-amz-meta-s3cmd-attrs: uid:0/gname:root/uname:root/gid:0/mode:33184/ This represents information disclosure and also it is better not to run this as root user to avoid an attacker executing malicious commands on the server *see my other report about DNS lookups* The main part of the response is here HTTP/1.1 502 Bad Gateway Content-Type: text/html Connection: close Date: Sun, 01 Jul 2018 08:06:19 GMT x-amz-meta-s3cmd-attrs: uid:0/gname:root/uname:root/gid:0/mode:33184/mtime:1513269652/atime:1513269652/md5:2049644b6b833f5dbb826f60a4721f64/ctime:1513269652 x-amz-version-id: VarInXu6gOLh_Jvy2jw7jpDFlOWjsQSj Server: AmazonS3 Strict-Transport-Security: max-age=31536000; includeSubDomains; preload X-Cache-Control-Orig: Cache-Control: max-age=0, must-revalidate, private X-Expires-Orig: None ETag: "e708d6-426d43661773" X-Cache: Error from cloudfront Via: 1.1 a038e18809b2b8ea7c607f48d7981dc0.cloudfront.net (CloudFront) X-Amz-Cf-Id: F-Wiqf9TifhuRT0Uevj7mz6fFjuvGJxdTP_Ut4ApOSLclfFWnqA8MQ== Content-Length: 11527 ## Impact Attacker can leverage the knowledge the server is running as root and use this knowledge to highlight the potential for compromise of the server. x-amz-meta-s3cmd-attrs: uid:0/gname:root/uname:root/gid:0/mode:33184/ Use — no-preserve to prevent storing of this information

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure