Lucene search

K
zdtDeb Prasad Banerjee1337DAY-ID-38558
HistoryApr 08, 2023 - 12:00 a.m.

ENTAB ERP 1.0 - Username PII leak Vulnerability

2023-04-0800:00:00
Deb Prasad Banerjee
0day.today
89
entab erp
username pii leak
broken access control
rate limits
fapscampuscare.in
vulnerability
exploit
deb prasad banerjee
windows iis
cve-2022-30076
login portal
userid field
rate limit
hacker
access control
threat actor
full name
user id
proxy
burp suite
intruder

0.001 Low

EPSS

Percentile

40.7%

Exploit Title: ENTAB ERP 1.0 - Username PII leak
Exploit Author: Deb Prasad Banerjee
Vendor Homepage: https://www.entab.in
Version: Entab ERP 1.0
Tested on: Windows IIS
CVE: CVE-2022-30076

Vulnerability Name: Broken Access control via Rate Limits

Description:
In the entab software in fapscampuscare.in, there is a login portal with a
UserId field. An authenticated user would enter and get their name as well
as other services. However, there should be a rate limit in place, which is
not present. As a result, a hacker could bypass the system and obtain other
usernames via broken access control. This enables a threat actor to
obain the complete full name and user ID of the person.

POC:
1. Go to fapscampuscare.in or any entab hosted software and find the entab
software.
2. Use a proxy to intercept the request.
3. Since it's a student login, try a random UserId (e.g., s11111).
4. Intercept the request using Burp Suite and send it to the Intruder.
5. Select payloads from number 100000-20000, and turn off URL encoding on
the UserId parameter.
6. Start the attack and sort by length to obtain the username and full name
of other users.

0.001 Low

EPSS

Percentile

40.7%