FirstBlood-#870Swagger UI reveals unauthenticated endpoint leaking sensitive data
This issue was discovered on FirstBlood v2.0.0 (issues patched)



On 2021-10-29, sumyth Level 2 reported:

Hi,

Please find a brief description of the vulnerability below,

Summary

On firstbloodhackers.com, it is possible to find hidden endpoints using basic directory fuzzing to reveal a Swagger API endpoint. The endpoint discloses a method which in turn reveals sensitive information related to vaccination without requiring any kind of authentication.

Steps to Reproduce:

  1. Visit the Swagger UI endpoint at - <truncated>.a.firstbloodhackers.com/vaccination-manager/api.php

  2. Observe the API method listed,

  1. Copy the method URL and open it in a new tab. Observe that it reveals the sensitive data regarding vaccination certificates uploaded including email, filename, IP.

Impact

Unauthorized access to API endpoints poses the threat of disclosing sensitive PII information.

P1 CRITICAL

This bug makes use of the following vulnerabilities in a chain:

  • Information leak/disclosure
  • Information leak/disclosure


FirstBlood ID: 31
Vulnerability Type: Information leak/disclosure

The endpoint api.php can be found under the vaccination manage portal directory which allows for user interaction and results in PII leak on vax-proof-list.php

FirstBlood ID: 37
Vulnerability Type: Information leak/disclosure

The endpoint /vaccination-manager/api/vax-proof-list.php leaks PII without any authentication. The intended solution was to find it via swagger-ui at /vaccination-manager/api.php