FirstBlood-#566 — Any user can update admin's password
This issue was discovered on FirstBlood v2
On 2021-10-26, panya Level 7 reported:
As I already reported in https://www.bugbountyhunter.com/hackevents/report?id=386 the site has a new endpoint /drpanel/drapi/editpassword.php
now.
It allows updating any user's password (and returns the newly generated password in the response).
As we know, the admin of this site has username drAdmin
, so any user could update the user password. For example via this request:
curl -X POST 'https://3ebb87898d31-panya.a.firstbloodhackers.com/drpanel/drapi/editpassword.php' --data-raw 'username=drAdmin'
And login as the administrator.
P1 CRITICAL
Endpoint: /drpanel/drapi/editpassword.php
This report contains multiple vulnerabilities:
FirstBlood ID: 27
Vulnerability Type: Application/Business Logic
It is possible to edit the admins password (dradmin) from /drapi/editpassword as it's only looking for the username. Usernames can be enumerated when logging in as trying 'drAdmin' results in a different error. The username can also be found from FirstBlood v1.
FirstBlood ID: 28
Vulnerability Type: Auth issues
The endpoint /drapi/editpassword can actually be accessed unauthenticated.