FirstBlood-#151 — Event attendees leaked
This issue was discovered on FirstBlood v1
On 2021-05-10, 0xSaltyHash Level 3 reported:
Summary:
Event attendees are leaked by injecting custom header found on sitesettings.php when querying the /attendees/event.php?q=560720
Steps to reproduce:
- Go to /hackerback.html.
- In the page source there is a JS script calling
/attendees/event.php?q=560720
- Try accessing this endpoint and you will get a blank page.
- Go to
/drpanel/drapi/sitesettings.php
.
- There is a custom header that is mentioned in that file
x-site-req: permitted
.
- try accessing
/drpanel/drapi/sitesettings.php
this time intercept the request in burp.
- Add the custom header and forward the request.
- Profit!.
EDIT: I revisited the Bug again and I was able to access PII by querying the old_eventID
.
P1 CRITICAL
Endpoint: /attendees/event.php?q=
Parameter: Header
Payload: x-site-req: permitted
FirstBlood ID: 13
Vulnerability Type: Information leak/disclosure
/attendees/event can be seen on the HackerBack.html page but has a blank response. Upon further inspection and from making use of the web app, you will notice you can add certain headers in order to interact with this endpoint. An old event ID leaks PII information about attendees.