Admin panel take over | User info leakage | Mass Comprimise
Critical
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
bigchonk
Vulnerability Details
Technical details and impact analysis
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!
**Summary:** [add summary of the vulnerability]
I'm able to take over the admin panel, allowing me to viewing the entire ticket database's PII (DOD ID, email, name by changing the URL and bypassing authentication
**Description:** [add more details about this vulnerability]
## Steps To Reproduce:
1: Go to
████████?x-app=itsm&x-urlpath=/arsys/shared/login.jsp&x-redir=%2Farsys%2Fforms%2Fedgelb-itsm-ar%2FRKM%253AKnowledgeArticleManager%2FDisplay%2BView%2F%3Feid%3DKBA000000024701%26cacheid%3Ddf8e1567
2: Change URL to
█████?x-app=itsm&x-urlpath=../../../../../../../../passwd
3)
LFI fails, click login
4) Enjoy full admin panel access
5 (Leak PII)
In the left hand corner, applications -> quick links -> AR system report console
Bottom left, click run
## Supporting Material/References:
* List any additional material (e.g. screenshots, logs, etc.)
Proof of PII:
██████████
Proof of admin panel:
█████████
## Impact
I can steal users DOD IDs, pretty much anything I want because I'm the websites admin
Change tickets
Change user info
Change permission
Steal PII
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Authentication Bypass Using an Alternate Path or Channel