Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Full Path Disclosure #17

Open
bright-security bot opened this issue Feb 28, 2022 · 0 comments
Open

Full Path Disclosure #17

bright-security bot opened this issue Feb 28, 2022 · 0 comments

Comments

@bright-security
Copy link

Full Path Disclosure

Severity: Medium Discovered: 28 of February-2022, 02:06 PM

CWE ID

CWE-200

CVSS

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Details

Full Path Disclosure (FPD) vulnerabilities enable an attacker to see the path to a webroot/file.
Certain vulnerabilities require the attacker to get the full path to the file that they wish to view.
For example, when using a load_file() query (within a SQL Injection) to view the page source.

Detected webroot/file is:
• /var/www/
Detected system is:
• linux

Found in URL:
https://brokencrystals.com/api/config
Detected that a new fake cookie(s) was added with the same name, but with a different value appended to the end of the cookie(s):
Original cookie:
• CGIC=; 1P_JAR=2022-02-28-13; NID=511=ER9pK9QjKoZ6Uke2LvnZdQMkGC6Tcf1gzB0oLEC7iOsRCDp-rLZ_jR7PDM3aJ3FHGVVCCz6khR5Pd5EXzlxOrIfkbE6hTaR4A3zqzanSWZC3yYO_JJiIzDrd5LBamFjxsxRcXUg1Nru-sHpb2yGk2wMmG-6xD-utJa3Rkec96TGNPQvG1VpxB-dT-SW3iFOiwl0YX7OIkeQpeMDKGIr2FLcmVKlxl-KJ4evJQ0ugj1Y9bGrojTxanJ-qDV9s1lTzNflWW1xcEQzEN8KiVh-2RpuxPUd3MfnInRC121EMQayt_Oj-2ZehAwmDP8LIBX3iYTT7; bc-calls-counter=2; connect.sid=2foCp7mAieXzl9wIKNOwhxoOzENZmxz8.B%2FBbzNffqR6uTKMjenRru7uekHndqeEgdAfnLNRtVSg
New cookie:
• CGIC=; 1P_JAR=2022-02-28-13; NID=511=ER9pK9QjKoZ6Uke2LvnZdQMkGC6Tcf1gzB0oLEC7iOsRCDp-rLZ_jR7PDM3aJ3FHGVVCCz6khR5Pd5EXzlxOrIfkbE6hTaR4A3zqzanSWZC3yYO_JJiIzDrd5LBamFjxsxRcXUg1Nru-sHpb2yGk2wMmG-6xD-utJa3Rkec96TGNPQvG1VpxB-dT-SW3iFOiwl0YX7OIkeQpeMDKGIr2FLcmVKlxl-KJ4evJQ0ugj1Y9bGrojTxanJ-qDV9s1lTzNflWW1xcEQzEN8KiVh-2RpuxPUd3MfnInRC121EMQayt_Oj-2ZehAwmDP8LIBX3iYTT7; bc-calls-counter=2; connect.sid=2foCp7mAieXzl9wIKNOwhxoOzENZmxz8.B%2FBbzNffqR6uTKMjenRru7uekHndqeEgdAfnLNRtVSg; bc-calls-counter=.
Cookie that is added:
• bc-calls-counter=.
Cookie key is:
• bc-calls-counter
Token is:
• .

Possible exposure

Read Application Data, Access to Privileged Information

Remediation suggestions

To fix this vulnerability –
• Disable debug information in the web server’s configuration.
• Improve the error handling and parsing of cookies in the relevant code paths, so that exceptions and/or errors will not leak internal information.

Request

GET https://brokencrystals.com/api/config? HTTP/1.1
Host: brokencrystals.com
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://brokencrystals.com/login
Accept-Encoding: identity
Accept-Language: en-US,en;q=0.9,ru-RU;q=0.8,ru;q=0.7
Cookie: CGIC=; 1P_JAR=2022-02-28-13; NID=511=ER9pK9QjKoZ6Uke2LvnZdQMkGC6Tcf1gzB0oLEC7iOsRCDp-rLZ_jR7PDM3aJ3FHGVVCCz6khR5Pd5EXzlxOrIfkbE6hTaR4A3zqzanSWZC3yYO_JJiIzDrd5LBamFjxsxRcXUg1Nru-sHpb2yGk2wMmG-6xD-utJa3Rkec96TGNPQvG1VpxB-dT-SW3iFOiwl0YX7OIkeQpeMDKGIr2FLcmVKlxl-KJ4evJQ0ugj1Y9bGrojTxanJ-qDV9s1lTzNflWW1xcEQzEN8KiVh-2RpuxPUd3MfnInRC121EMQayt_Oj-2ZehAwmDP8LIBX3iYTT7; bc-calls-counter=2; connect.sid=2foCp7mAieXzl9wIKNOwhxoOzENZmxz8.B%2FBbzNffqR6uTKMjenRru7uekHndqeEgdAfnLNRtVSg; bc-calls-counter=.

Response

HTTP/1.1 500
server: nginx/1.19.8
date: Mon, 28 Feb 2022 14:06:20 GMT
content-type: application/json; charset=utf-8
content-length: 107
connection: keep-alive
vary: Origin
access-control-allow-origin: *
set-cookie: connect.sid=LBOBaDZPGgsOicjNnoCCw1gJ0wKDs5YE.UehDvD8wfE74tSmbtL0BjZs%2FUR02g5HTkQFvURZpsd4; Path=/
Cache-Control: public, max-age=99999

{"error":"Invalid counter value","location":"/var/www/dist/components/headers.configurator.interceptor.js"}

External links

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants