Username field are not unique to users allowing exploitation of primary key logic by creating same name with different combinations & unauthorized access in ikus060/rdiffweb
Reported on
Dec 22nd 2022
Description
The username fields while creating a user Role is same which should not be the case, the username should be made unique.
Proof of Concept
1. Login to Demo account at https://rdiffweb-demo.ikus-soft.com/login/
2. Enter the username and password as admin: admin123 respectively.
3. visit to https://rdiffweb-demo.ikus-soft.com/admin/users
4. Click on "Add user" button
5. Fill the form with your choice & use the same email every time to create more such users & also change the "User Role" each time you want till whatever you want.
6. You will notice that there is a major flaw in user's permission access control where in "username" are considered as a primary key.
7. Now add another user the same username but with capital letters in the combinations for same username, it will be addressed unique by the system & a new user Role with the same "username" word will be created.
Impact
- This is leading to primary key exploitation.
- This is leading to broken authorization as a user was able to fool and create same username and fool the system which is leading to authorization bypass.
- It may also cause confusion within the users & lead to more attacks on the system.
@raiders0786 Could you adjust the security level of this report. As it's required Admin privilege to create username with various case the severity should not be 9.8
I've updated the severity by increasing the privilege required parameter as HIGH. There might by ways from which admins can be tricked while they are awake from the system or issues due to session in future if any.
As the issues is affecting the critical logic of primary keys which is leading to creations of more such admin users with different combination of letters, this issue severity should be High!
@patrik I wanted to know if this issue be eligible for a CVE ID upon resolution.
Happy to Secure :)
I've complete a change for this and deployed it on:
rdiffweb-dev.ikus-soft.com admin / admin123
If you could test it, that would be great.
Super ! Will soon prepare a release and publish it.
Thanks
Thank you Patrik for the quick fix & publishing this vulnerability!