Loading HuntDB...

Cross-origin resource sharing: arbitrary origin trusted on chatws25.stream.highwebmedia.com

None
C
Chaturbate
Submitted None
Reported by mase289

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
*Very low-quality reports, such as those which only contain automated output, will be rejected.* ##Summary## Hi, i was able to discover a number of instances on chatws25.stream.highwebmedia.com were the application accepts an arbitrarily supplied origin. The application implements an HTML5 cross-origin resource sharing (CORS) policy for requests that allows access from any domain. POC The application allowed access from the requested origin https://vazeeukllvua.com ## Steps To Reproduce: 1. Using an intercepting proxy , make the following request ; GET /ws/info HTTP/1.1 Host: chatws25.stream.highwebmedia.com Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Connection: close Origin: https://vazeeukllvua.com Cookie: __cfduid=dc7d8e518c8e0f8610c6c317c31c6f46e1538467160 2. Observe the following request which proves that the application is vulnerable: HTTP/1.1 200 OK Date: Tue, 02 Oct 2018 08:25:48 GMT Content-Type: application/json; charset=UTF-8 Connection: close Access-Control-Allow-Credentials: true Access-Control-Allow-Origin: https://vazeeukllvua.com Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct" Server: cloudflare CF-RAY: 4635c7cb98c72ca2-MBA Content-Length: 79 {"websocket":true,"cookie_needed":false,"origins":["*:*"],"entropy":600356669} 1. [add step] ## Supporting Material/References: https://cwe.mitre.org/data/definitions/942.html https://portswigger.net/blog/exploiting-cors-misconfigurations-for-bitcoins-and-bounties ## Impact Since the Vary: Origin header was not present in the response, reverse proxies and intermediate servers may cache it. This may enable an attacker to carry out cache poisoning attacks. An HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request. Trusting arbitrary origins effectively disables the same-origin policy, allowing two-way interaction by third-party web sites. Unless the response consists only of unprotected public content, this policy is likely to present a security risk. If the site specifies the header Access-Control-Allow-Credentials: true, third-party sites may be able to carry out privileged actions and retrieve sensitive information. Even if it does not, attackers may be able to bypass any IP-based access controls by proxying through users' browsers

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Access Control - Generic