FirstBlood-#1548 — Anyone can edit ambulances
This issue was discovered on FirstBlood v3
On 2022-12-11, pichik Level 4 reported:
Hi,
DESCRIPTION
After creating custom wordlist I found another hidden endpoint /api/manageambulances.php.
This endpoint allows anyone to edit ambulances.
As POST gives us Unauthorised!, we can just use PUT request, which works fine.
By working step by step on this request, response will reveal to us everything what we need - that we need to send json and all params requried.
Here is simple request:
PUT /api/manageambulances.php HTTP/1.1
Host: 63c0f77f87b7-pichik.a.firstbloodhackers.com
Content-Length: 101
{
"driver":"No driver for you",
"number":"1337",
"ambId":"1e69d88d-08f9-4429-890c-bd11d4bd3e09"
}
POC SCREEN:

IMPACT:
Attacker can create chaos, or chain it with another bugs to attack users.
REMEDIATION:
Be more careful with managing/removing public endpoints, as they still be fuzzed accessed if no server side prevention is added.
This endpoint should be made just internal only.
P2 High
Endpoint: /api/manageambulances.php
Parameter: Method
Payload: PUT
FirstBlood ID: 73
Vulnerability Type: Stored XSS
The endpoint /api/manageambulances.php will respond to an unauthenticated PUT request which allows an attacker to modify the information