Lucene search

K
huntrNeverjuniorB2DC504D-92AE-4221-A096-12FF223D95A8
HistoryNov 21, 2022 - 5:39 a.m.

Unauthorized access to settings update, logs , history, delete etc of repositories

2022-11-2105:39:39
neverjunior
www.huntr.dev
16
unauthorized access
repo settings
logs
history
user privileges
manager privileges
root directory
attack scenario
bug bounty
poc

EPSS

0.002

Percentile

57.2%

Hey,

Attack Scenario:

Admin setups new user with User privileges and gives access to repos “/” root directory, after a time due to some reason he revoke the privileges of the directory access but user privileged attacker can still edit settings , check logs and view history without having permissions.

Steps To reproduce:

From Admin’s account make a new user with least privileges and give him access to root directory “/”
Change the Root directory to blank and revoke the access to root directory.
Go to User’s account, if you will try to access browse it will give you 403 but if you directly access it via
For example “backups/MyWindowsLaptop/C” : https://rdiffweb-demo.ikus-soft.com/browse/{user-account}/backups/MyWindowsLaptop/C it will give you 403 but if we try to access it via https://rdiffweb-demo.ikus-soft.com/settings/{user-account}/backups/MyWindowsLaptop/C https://rdiffweb-demo.ikus-soft.com/logs/{user-account}/backups/MyWindowsLaptop/C https://rdiffweb-demo.ikus-soft.com/history/{user-account}/backups/MyWindowsLaptop/C https://rdiffweb-demo.ikus-soft.com/graphs/activities/{user-account}/backups/MyWindowsLaptop/C

even if attacker can’t view it directly but he can perform all the functionalities which were supposed to be revoked like downliad, history , edit settings , graphs , logs , etc.

If the Attacker’s account had Manager privileges he can also delete the repo. Same scenario with Manager account too.

POC: https://docs.google.com/document/d/1b9uMYyL6n6Js0Aw55ehsh9skQdJ1Q3D52Ve3bqTI9_A/

EPSS

0.002

Percentile

57.2%

Related for B2DC504D-92AE-4221-A096-12FF223D95A8