Open memory dump method leaking customer information ,secret keys , password , source code & admin accounts
Critical
S
Stripo Inc
Submitted None
Actions:
Reported by
secyour-org
Vulnerability Details
Technical details and impact analysis
## Summary:
Stripo uses Spring boot for the backend API development , and misconfigured the application to open actuator APIs to the public.
This issue is found in 3 domains , don't know if I need to publish 3 reports for that, or just one report , but the domains are :
https://my.stripo.email/cabinet/stripeapi/actuator
https://plugins.stripo.email/actuator
https://plugin.stripo.email/actuator
it might be available in other micro services as well
## Steps To Reproduce:
1. Go to the following URL : https://my.stripo.email/cabinet/stripeapi/actuator/heapdump
1. This url will download the heap dump of the server
1. using a memory analyzer such as Eclipse memory analyzer or VisualVM open the downloaded file
1. By searching inside the file you can find all the secrets , credentials , urls , JWT tokens & JWT secret keys, which can be used and generate any JWT token and takeover any account on the system.
1. Attached some examples of what can be found and used by this vulnerability, and you can imagine any bad scenario, and this issue can be used to take over/down Stripo
## Supporting Material/References:
Please find more information about actuator on the following URL:
https://docs.spring.io/spring-boot/docs/current-SNAPSHOT/actuator-api/html/#heapdump
Example of open functionalities:
████
Admin Credentials:
███
Other User's information:
█████████
Billing Service Credentials:
████
Config Server Credentials:
███████
## Impact
This vulnerability allows any attacker to perform many severe attacks such as :
- Upgrade accounts without payments.
- Get logged in customer information and get access to the session & JWT tokes to take over accounts
- PII Data leaking
- Accessing all credentials from the application properties such as , admin credentials, swagger credentials , billing credentials .
- Get database credentials
- Server Environment variable
- Server config Properties.
- Payments manipulations and money stealing
- and more
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Exposed Dangerous Method or Function