Openware builds next-gen blockchain infrastructures and leads the development of innovative Fintech projects.
Target | Type | Severity | Reward |
---|---|---|---|
https://alpha.yellow.org Copy Copied | Web | Critical | Bounty |
We are interested in the following vulnerabilities:
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
1. OTG-CONFIG-006- Test HTTP Methods
RFC 2616 (which describes HTTP version 1.1 which is the standard today) defines the following eight methods:
2. OTG-SESS-002- Testing for Cookies attributes If an attacker were able to acquire a session token (for example, by exploiting a cross site scripting vulnerability or by sniffing an unencrypted session), then they could use this cookie to hijack a valid session. Second, there is the option Secure which does not allow the cookie to be sent over a plain HTTP connection. It can only be sent over HTTPS. This makes sense only if the entire application is available over HTTPS and should be used that way only
Business impact: It gives the hacker the possibility to get the value of the cookie unencrypted and to create idea about cookies information
3. OTG-SESS-003 -Testing for Session Fixation In the generic exploit of session fixation vulnerabilities, an attacker creates a new session on a web application and records the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier, giving the attacker access to the user's account through the active session. In our case we were able to export cookies to another machine, and after accessing the system from that other machine, we were logged into the application without authentication. As a result, we were able to hijack the session.
Business impact It is possible to perform hijacking of an authenticated user’s session. As the application doesn’t suffer from XSS (see also below), this issue is not high profile.
4. OTG-BUSLOGIC-001-Test Business Logic Data Validation At URL /wallets , at “Add new withdrawal address” all parameters “does not validate properly inputs according to a logic. At URL POST /api/v2/barong/resource/profiles back-end parameter “dob” is allowing inputs beside the standard ones. At back-end parameter is allowing inputs beside the standard ones. POST /api/v2/barong/resource/documents as shown the picture below .
Business impact: The front end and the backend of the application should be verifying and validating that the data it has, is using and is passing along is logically valid. Even if the user provides valid data to an application the business logic may make the application behave differently depending on data or circumstances.
5. OTG-BUSLOGIC-009-Test Upload of Malicious Files Many application’s business processes allow for the upload of data/information. We regularly check the validity and security of text but accepting files can introduce even more risk. To reduce the risk we may only accept certain file extensions, but attackers are able to encapsulate malicious code into inert file types. Testing for malicious files verifies that the application/system is able to correctly protect against attackers uploading malicious files. In my case I was able to upload double file extension. POST /api/v2/barong/resource/documents
Business impact: This can compromise the whole server and give to hacker full access to it and databases.
6. OTG-CLIENT-009- Testing for Clickjacking “Clickjacking” (which is a subset of “UI redressing”) is a malicious technique that consists of deceiving a web user into interacting (in most cases by clicking) with something different to what the user believes they are interacting with. This type of attack, that can be used alone or in combination with other attacks, could potentially send unauthorized commands or reveal confidential information while the victim is interacting with seemingly harmless web pages. A Clickjacking attack uses seemingly innocuous features of HTML and JavaScript to force the victim to perform undesired actions, such as clicking a button that appears to perform another operation. This is a “client side” security issue that affects a variety of browsers and platforms. In our case we did it by simulating with burpsuite.
Business impact: Hackers can manipulate genuine users to click on unwanted URL resulting in unwanted results.
7. A3-Sensitive Data Exposure (Top 10 findings) Sensitive Data Exposure occurs when an application does not adequately protect sensitive information.
Business impact A hacker gains valuable information for further attacks.