Lucene search

K
zdtCraCkEr1337DAY-ID-39012
HistorySep 04, 2023 - 12:00 a.m.

PlayTube 3.0.1 Information Disclosure Vulnerability

2023-09-0400:00:00
CraCkEr
0day.today
114
playtube
information disclosure
vulnerability
redirect
sensitive information leakage
cve-2023-4714
cwe-200
cwe-284
cwe-266
razorpay payment
administration panel
payment configuration

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.605 Medium

EPSS

Percentile

97.8%

# Exploit Title: PlayTube 3.0.1 - Redirect Information Disclosure
# Exploit Author: CraCkEr
# Vendor: PlayTube
# Vendor Homepage: https://playtubescript.com/
# Software Link: https://demo.playtubescript.com/
# Tested on: Windows 10 Pro
# Impact: Sensitive Information Leakage
# CVE: CVE-2023-4714
# CWE: CWE-200 - CWE-284 - CWE-266


## Greetings

The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka
CryptoJob (Twitter) twitter.com/0x0CryptoJob


## Description

Information disclosure issue in the redirect responses, When accessing any page on the website,
Sensitive data, such as app IDs, is being exposed in the body of these redirects.


## Steps to Reproduce:

When you visit most of pages on the website, such as the index page for example:

https://website/

in the body page response there's information leakage for "RazorPay Payment" id KEY

+--------------------------------------+
razorpay_options = {
          key: "rzp_test_ruz***********"
+--------------------------------------+


Note: The same information leaked, for the app ID KEY, was added to the "Payment Configuration" in the Administration Panel

Settings of "Payment Configuration" in the Administration Panel, on this Path:

https://website/admin-cp/payment-settings


[-] Done

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.605 Medium

EPSS

Percentile

97.8%

Related for 1337DAY-ID-39012