Loading HuntDB...

Open memory dump method leaking customer information ,secret keys , password , source code & admin accounts

Critical
S
Stripo Inc
Submitted None
Reported by secyour-org

Vulnerability Details

Technical details and impact analysis

Exposed Dangerous Method or Function
## Summary: Stripo uses Spring boot for the backend API development , and misconfigured the application to open actuator APIs to the public. This issue is found in 3 domains , don't know if I need to publish 3 reports for that, or just one report , but the domains are : https://my.stripo.email/cabinet/stripeapi/actuator https://plugins.stripo.email/actuator https://plugin.stripo.email/actuator it might be available in other micro services as well ## Steps To Reproduce: 1. Go to the following URL : https://my.stripo.email/cabinet/stripeapi/actuator/heapdump 1. This url will download the heap dump of the server 1. using a memory analyzer such as Eclipse memory analyzer or VisualVM open the downloaded file 1. By searching inside the file you can find all the secrets , credentials , urls , JWT tokens & JWT secret keys, which can be used and generate any JWT token and takeover any account on the system. 1. Attached some examples of what can be found and used by this vulnerability, and you can imagine any bad scenario, and this issue can be used to take over/down Stripo ## Supporting Material/References: Please find more information about actuator on the following URL: https://docs.spring.io/spring-boot/docs/current-SNAPSHOT/actuator-api/html/#heapdump Example of open functionalities: ████ Admin Credentials: ███ Other User's information: █████████ Billing Service Credentials: ████ Config Server Credentials: ███████ ## Impact This vulnerability allows any attacker to perform many severe attacks such as : - Upgrade accounts without payments. - Get logged in customer information and get access to the session & JWT tokes to take over accounts - PII Data leaking - Accessing all credentials from the application properties such as , admin credentials, swagger credentials , billing credentials . - Get database credentials - Server Environment variable - Server config Properties. - Payments manipulations and money stealing - and more

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Exposed Dangerous Method or Function