Lucene search

K
hackerone19whoami19H1:2545994
HistoryJun 11, 2024 - 9:27 a.m.

Enjin: Cloudflare /cdn-cgi/ path allows resizing images from unauthorised sources on enjinusercontent.com

2024-06-1109:27:26
19whoami19
hackerone.com
13
cloudflare
cdn-cgi
unauthorized access
image resizing
html injection
ssrf
access control
external cdns
misinformation
platform manipulation
web security

7.1 High

AI Score

Confidence

High

##Summary

Hello team,
During a review of the website: https://nft.production.enjinusercontent.com/ I discovered that any resource hosted under any external CDN can be rendered on the website without any restrictions. This behavior leads display of images or resources on the website, which may cause confusion for users or expose potentially sensitive assets or otherwise deface the websites or carry our misinformation or malware campaigns.

  • You Achive :
    1- HTML INJECTION
    2- SSRF and Portal Scanning
    3- Unrestricted rendering of resources from external CDNs

##Steps to Reproduce :

1- For HTMLi Visit : https://nft.production.enjinusercontent.com/cdn-cgi/image/width=1000,format=auto/https://raw.githubusercontent.com/simple-icons/simple-icons/develop/icons/cloudflare.svg

{F3347763}

Impact

Misuses of the cdn-cgi Misconfig to render external resources
Access control Bypass by smuggling in external resources to render at the company url unrestricted
Misinformation and platform manipulation for displayed content to any user without interaction
Attacker can redirect users to another websites, virtual defacement of your website etc.
Webpage modifications
HTML Injection

7.1 High

AI Score

Confidence

High