Loading HuntDB...

IDOR when creating App on [platform.streamlabs.com/api/v1/store/whitelist] with user_id field

Low
L
Logitech
Submitted None
Reported by bugra

Vulnerability Details

Technical details and impact analysis

Insecure Direct Object Reference (IDOR)
## Summary: Hi team, There is a IDOR when applying to platform.streamlabs.com after loginning. If you login to platform.streamlabs.com and click `Create App`. You will see the "apply form". And if you submit it, you will see the `user_id` parameter in JSON data of the apply request. (api/v1/store/whitelist). This parameter is vulnerable for IDOR, you can apply to platform as another accounts. Also these `user_id`s are sequential, so any attacker can apply this form with a lot of accounts with random values. Attacker can force the victims' apply forms to be rejected. ## Steps To Reproduce: 1. Sign-up to platform.streamlabs.com with 2 different accounts (Make sure you didn't apply the apply form before.) 1. Click `Create App` and turn on the proxy 1. Fill in the form and click `Apply` 1. Change the `user_id` on the JSON data of the request to your another account's ID. 1. Forward the request. `user_id`'s are sequential, for finding your user_id you can go to https://platform.streamlabs.com/api/v1/s/user/me If you see `200 OK` in response, that means you submitted the form as victim. {F989441} Now, the victim can't apply the form again. And if you fill the form with random values. Streamlabs will probably reject the victim's form because of random values. ## Impact Any attacker can apply the platform form with a lot of accounts with random values. So attacker can force the victims' apply forms to be rejected. I don't know the full impact because I didn't get response for my Platform request yet. Maybe there is more serious impact on this issue but I can't figure it out for now. Thanks, Bugra

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insecure Direct Object Reference (IDOR)