param allows any external resource to be downloadable | https://████████
High
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
x3ph_
Vulnerability Details
Technical details and impact analysis
**Description:**
The following param allows an attacker to trick people into downloading malicious files, scripts and other payloads.
https://██████████?url=https://<MaliciousURL>
PoC
1. I will show you how the page looks normally without any changes. If you directly access https://███ you will be shown the following page. You can click on 'Click to download' but nothing happens.
█████
2. I replace the download param with the url param and entered my attacking vps server ip address as the URL and execute.
█████
3. On my attacking vps server (The black console) you can see that i have received the request from my personal computers ip address showing that it is 100% possible to perform this attack.
https://██████████?url=https://████/poc
████████
## Impact
If an attacker abuses this vulnerability he/she will be able to compromise accounts, computers and identities of people. Potentially Military staff if the attacker had bad intentions.
## Step-by-step Reproduction Instructions
1. Navigate to https://███████
2. Click on 'Click to download'
3. Replace download with url
4. Type in a url and click download
## Product, Version, and Configuration (If applicable)
## Suggested Mitigation/Remediation Actions
Dev needs to add validation to the url param so that it doesn't allow external resources to be downloadable.
Resources:
The only article i can find pertaining to this type of vulnerability
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
## Impact
If an attacker abuses this vulnerability he/she will be able to compromise accounts, computers and identities of people. Potentially Military staff if the attacker had bad intentions.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic