Hi there! As an avid bug bounty hunter, I always look forward to weekends to participate in different programs and discover vulnerabilities that can help make the internet a safer place. One particular weekend, I received an email from one of the private companies I regularly participate in, informing me that they had updated their infrastructure.
As you may know, when a company updates its infrastructure, it presents an opportunity for bug hunters to dig deeper and find new vulnerabilities. With this in mind, I immediately started my recon process to identify any potential vulnerabilities in the updated infrastructure.
Since many hunters were already looking for bugs in the same domain, I knew that finding something new could be a game-changer. I was determined to leave no stone unturned and to find something unique that could earn me a good bounty
During my reconnaissance process, I used a directory brute-forcing tool, such as Dir-search, to try and find any admin access to the updated infrastructure. After some searching, I found that accessing the URL /admin would automatically redirect me to /carbon/admin/login.jsp, which looked like a potential login page for an admin panel.
I attempted to use various login bypass and admin panel takeover attacks to gain access to the admin panel, but unfortunately, none of them were successful. At this point, I decided to do some research on /carbon/admin/ and assumed that the backend of the application may use a plugin, CMS, or framework that was causing the redirect.
After some Google searches, I found that the application was using the WSO2 Management Console, and I also came across information on a potential vulnerability, CVE-2020–17453, which was a reflected XSS vulnerability. However, I had over 35 subdomains to test, and I could not manually test each one for the vulnerability.
XSS (Cross-Site Scripting) is a type of security vulnerability in web applications where an attacker can inject malicious scripts into a web page viewed by other users. The malicious scripts are typically executed in the browser of the victim user, allowing the attacker to steal sensitive information, such as session cookies, login credentials, or personal data.
There are several types of XSS attacks, but the most common type is called “Reflected XSS.” In a Reflected XSS attack, the attacker sends a malicious link to a victim user, which contains a script that is executed when the victim user clicks on the link. The script is then reflected back to the victim’s browser by the server, which allows the attacker to execute the script in the context of the victim’s session.
CVE-2020–17453 is a Common Vulnerabilities and Exposures (CVE) identifier assigned to a reflected cross-site scripting (XSS) vulnerability that was discovered in WSO2 Carbon versions prior to 4.4.13, 4.5.0 to 4.5.7, 5.0.0 to 5.0.4, and 5.1.0 to 5.1.5. This vulnerability allows an attacker to inject and execute malicious code on the victim’s browser by tricking them into visiting a specially crafted URL, leading to potential data theft, cookie hijacking, or other malicious activities.
To automate the testing process, I created a script using Node.js to test each subdomain for the CVE-2020–17453 vulnerability. Finally, I hit the jackpot, and the script identified one of the subdomains as vulnerable to the vulnerability, providing me with an output containing the payload.
My process for performing security testing involves several steps.
Upon confirming the vulnerability, I made the decision to release the tool as an open-source resource, allowing other cyber security enthusiasts to leverage it and identify similar vulnerabilities in various websites and applications.
Github Link : https://github.com/karthi-the-hacker/CVE-2020-17453
It is important to note that this vulnerability has since been patched in the affected versions of WSO2 Carbon. However, this serves as a reminder of the significance of regularly updating and patching software to avoid such vulnerabilities and threats. As security professionals, we must remain vigilant in our efforts to identify and mitigate potential security risks to keep our digital world secure.
Twitter: https://twitter.com/karthithehacker
Instagram: https://www.instagram.com/karthithehacker/
LinkedIn: https://www.linkedin.com/in/karthikeyan--v/
Website: https://www.karthithehacker.com/
Github : https://github.com/karthi-the-hacker/
npmjs: https://www.npmjs.com/~karthithehacker
Youtube: https://www.youtube.com/karthithehacker
Thank you