I recently uncovered a flaw permits regular users to regenerate API keys for the test suite, utilizing an API endpoint originally designated for administrators only. This article outlines the issue, its potential impact, and the steps to reproduce the vulnerability.
Understanding Target
Examkite(Virtual Name of bbp), a versatile continuous integration and delivery (CI/CD) platform, empowers development teams to streamline and automate their software delivery processes. This platform serves as the backbone for efficient collaboration, enabling teams to build, test, and deploy code seamlessly.
The Bug
The vulnerability is a type of API access control concern, allowing regular users to exploit an API endpoint meant for higher-access users. This oversight may empower an attacker to perform actions beyond their intended capabilities. If exploited, an attacker could carry out unauthorized actions and enables regular Examkite users to regenerate an API key for the test suite through an API endpoint typically restricted to administrators.
Before we move on, if you like my write-ups, please support me by clapping, sharing, and you can clap up to 50 times here on Medium, it’s free. Thank you.
The Bounty
A bounty of $500 has been awarded for the responsible disclosure of this security vulnerability by Examkite team.
Takeaway
This incident serves as a reminder for platform developers to consistently evaluate and reinforce access restrictions, safeguarding against potential breaches and ensuring the integrity of user actions.
Leave some clap if you enjoyed this read, leave your feedback in comment and consider following me for more exciting findings.
Find me on Twitter: @a13h1_
Keep Supporting, Keep Clapping, Keep Commenting.