Task #12568

Task #12556: Pentest - 2nd Assessment [2021]

Pentest_IBAM - Insecure Direct Object Reference (IDOR) [LOW]

Added by Nurul Athira Abdul Rahim almost 3 years ago. Updated 7 months ago.

Status:Closed - End of life cycleStart date:November 08, 2021
Priority:NormalDue date:
Assignee:Nurul Athira Abdul Rahim% Done:

100%

Category:Penetration Test IssueSpent time:-
Target version:-

Description

Insecure direct object reference occurs when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization and access resources in the system directly, for example database records or files. Insecure direct object reference allows attackers to bypass authorization and access resources directly by modifying the value of a parameter used to directly point to an object. Such resources can be database entries belonging to other users, files in the system, and more. This is caused by the fact that the application takes user supplied input and uses it to retrieve an object without performing sufficient authorization checks.

Solution provided by LGMS:
Preventing insecure direct object references requires selecting an approach for protecting each user accessible object (e.g., object number, filename):

1. Use per user or session indirect object references. This prevents attackers from directly targeting unauthorized resources. For example, instead of using the resource’s database key, a drop down list of six resources authorized for the current user could use the numbers 1 to 6 to indicate which value the user selected. The application has to map the per-user indirect reference back to the actual database key on the server.
2. Check access for each use of a direct object reference from an untrusted source must include an access control check to ensure the user is authorized for the requested object.

'Affected URL:

http://10.10.55.34:9081/bsn-admin-uat/ss103/groupDetails.do?SECONDARY_TOKEN=d4865bf6fe6814e21242a9635107d8cc&groupID=42
http://10.10.55.34:9081/bsn-admin-uat/ss103/groupEdit.do?SECONDARY_TOKEN=18d82afdeca739d0a06ca24584cd1495&groupID=262

Potential
http://10.10.55.34:9081/bsn-admin-uat/ss103/deleteGroupConfirm.do?SECONDARY_TOKEN=&groupID=264

Action Plan:
Fix query /JSP

ori groupId.JPG (19.8 KB) Nurul Hasnieza Bt Mohd Zamri, December 17, 2021 15:13

invalid groupID.JPG (20.2 KB) Nurul Hasnieza Bt Mohd Zamri, December 17, 2021 15:13

Error Msg.JPG (181 KB) Nurul Hasnieza Bt Mohd Zamri, December 17, 2021 15:13

example to check request currently deleted not desplay.JPG (213 KB) Nurul Hasnieza Bt Mohd Zamri, December 17, 2021 15:13

History

#1 Updated by Nurul Hasnieza Bt Mohd Zamri almost 3 years ago

  • Status changed from New - Begin Life Cycle to Finished Development
  • % Done changed from 0 to 80

Add validation check with deleted group. Add query criteria restriction equals to deleted FALSE filtering to get the group listing.
System will prompt error message when insert deleted/invalid groupID at url parameter.

#2 Updated by Nurul Hasnieza Bt Mohd Zamri almost 3 years ago

  • Status changed from Finished Development to Internal Testing
  • Assignee changed from Nurul Hasnieza Bt Mohd Zamri to Nurul Athira Abdul Rahim

SIT deploy on 13/12/2021

1. Insert deleted/invalid groupID at url parameter.
2. System will prompt error message.

Kindly retest.

#4 Updated by Nurul Athira Abdul Rahim over 2 years ago

  • Status changed from Internal Testing to System Integration Test
  • % Done changed from 80 to 90

#5 Updated by Najmi Pasarudin over 2 years ago

  • Status changed from System Integration Test to Pending Prod Deployment
  • Assignee changed from Nurul Athira Abdul Rahim to Najmi Pasarudin

#6 Updated by Nurul Athira Abdul Rahim over 2 years ago

  • Status changed from Pending Prod Deployment to Development / Work In Progress

Kindly review the fixes, as the new pentest (March,9,20202) result status stated "not solved".

#7 Updated by Najmi Pasarudin over 2 years ago

  • Status changed from Development / Work In Progress to System Integration Test
  • Assignee changed from Najmi Pasarudin to Nurul Athira Abdul Rahim

Previous fix was wrong.
SIT deployed on 16/3/2022

#8 Updated by Nurul Athira Abdul Rahim 7 months ago

  • Status changed from System Integration Test to Closed - End of life cycle
  • % Done changed from 90 to 100

Closed for this and refer new 2023/2024 pentest report

Also available in: Atom PDF