Using E-Notation to bypass Access Control restrictions to access arbitrary user PII-discussions

2 weeks ago 18
BOOK THIS SPACE FOR AD
ARTICLE AD

Keizo

The company targeted in this bug bounty research is a large cap company with over 2 million customers worldwide. More specifically the host discussed in this article is a multi-user website with various functions, including discussions feature between the company employees and its users. These discussions are regarded as highly sensitive and include PII data which should be protected accordingly. During the investigation, a vulnerability was discovered that allowed unauthorized access to other users’ discussions through an access control bypass method and IDOR.

Sensitive details about the company and requests are redacted and the requests shown do not represent any real user.

The website’s discussion function utilized a user ID in the API request “GET /api/v1/user/123/discussions” Initially, the ID was protected against IDOR, returning a 403 error if the user lacked access to the entered ID. However, it was noted that entering IDs in unconventional formats, such as “123a” resulted in a 400 error with the message “error from discussions API.” Interestingly, querying a different API request with unconventional user ID format on the same host, such as “GET /api/v1/information/users/123a” returned the same result as the standard request “GET /api/v1/information/users/123” highlighting abnormal behavior in the firstly introduced discussions API.

Normal request to fetch user’s discussions

Multiple attempts were made to exploit the discussions API user ID validation, revealing inconsistent responses to different ID formats.

”123aaa” —> 400 – ”Error from discussions api””123” —> 200 – ”Discussions for user 123: …””123.0” —> 200 – ”Discussions for user 123: …””123.2” —> 200 – ”Discussions for user 123: …””111.0” —> 403 – ”User has no access to this id””1234” —> 403 – ”User has no access to this id””123+1” —> 400 – ”Error from discussions api””123/1” —> 400 – ”Error from discussions api””123*1” —> 400 – ”Error from discussions api””123–0” —> 400 – ”Error from discussions api”

Despite attempts to manipulate IDs using arithmetic operations, they proved ineffective. However, it was observed that modifying the value so that it would result in correct numeric representation to the correct ID allowed successful requests.

As there are different ways of expressing numbers. This was the next point of focus. The expression could not be hex (123 = 0x7B) and it could not include any characters that are not “url safe” since it had to start with the correct user id. So… here comes the scientific operation called E-notation to the rescue. E-notation is normally used to represent really large or really small numbers that would be too long to conveniently represent in decimal form. For example 100 in E-notation would be represented as 10e1 or 1000e-1 or possibly as 10.0e1. There is a great calculator that was used during this case that helped a lot with finding the correct representation.

Since the correct expression that is valid to the access control validation, needed to start with the correct user ID. This needed to be taken into consideration. By incorporating the correct user ID with the E-notation into the request, the access control validation was successfully bypassed:

“123e0” (123 in decimal) —> 200 – “Discussions for user 123: …”“123e1” (1230) —> 200 – “Discussions for user 1230: You should not see this…”
Incorporating E-notation to the request allowed bypass of access control validation (user data in photo is fictive)

This method effectively circumvented access controls by including the necessary pieces for validation while “smuggling” additional values into the backend call. Validation only validated the first numeric characters inputted and the rest was disregarded if the representation was the correct numeric value (e.g. 123.0, 123.3, 123e3).

Discussions fetch flow that represents inconsistencies in the numeric representation

However, this approach has limitations, restricting traversal to only IDs higher than the user’s own ID by a factor of 10 (e.g., ID 123 could access discussions for users 1230 and above):

“123e1” —> 1230“123.1e1” —> 1231“123.2e1” —> 1232

Furthermore, certain edge cases allowed access to users included in the requester’s ID:

“123e-1” —> 12.3 —> user 12“123e-2” —> 1.23 —> user 1

This vulnerability was caused by the possibility to “smuggle” values into the backend calls to fetch user’s discussions. This was made possible by inconsistent handling of different numeric representations by the backends.

Upon discovery, this vulnerability was promptly reported to the affected company, recognized as a critical severity issue, and rewarded with a significant four-digit bounty.

Diagrams by: https://sequencediagram.org/

E-Notation calculator: https://www.calculatorsoup.com/calculators/math/scientific-notation-converter.php

Sample requests by: https://ssrf.cvssadvisor.com/

Read Entire Article