Document Title: =============== BlinkSale Bug Bounty #1 - Encode & Validation Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1416 Release Date: ============= 2015-02-06 Vulnerability Laboratory ID (VL-ID): ==================================== 1416 Common Vulnerability Scoring System: ==================================== 3.6 Product & Service Introduction: =============================== We like to get paid. We’re sure you feel the same. So while you can use Blinksale and get paid by check, our integration with Stripe* makes it easy to get paid in a flash. Just sign up at Stripe, put your credentials into Blinksale, and you’re all set to accept credit card payments on your invoices! (Copy of the Vendor Homepage: https://www.blinksale.com/ ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered an application-side input validation mail encoding web vulnerability in the official BlinkSale web-application. Vulnerability Disclosure Timeline: ================================== 2015-01-19: Researcher Notification & Coordination (Benjamin Kunz Mejri) 2015-01-20: Vendor Notification (BlinksaleSecurity Team) 2015-01-26: Vendor Response/Feedback (BlinksaleSecurity Team) 2015-02-03: Vendor Fix/Patch (Blinksale Developer Team) 2015-02-06: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Doublewide Partners Product: Blinksale 2015 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistent input validation mail encoding vulnerability has been discovered in the official BlinkSale company web-application. The issue allows remote attackers to inject own malicious web context to the application-side of a vulnerable module or function. The security vulnerability is located in the `firstname` and `lastname` input field values of the `signups` file. Remote attackers and local privileged application user accounts can exploit the issue to execute persistent malicious context in blinksale service mails. The injection takes place in the signup POST method request with the vulnerable input values. The execution of the script code occurs on the application-side in the email after the introduction word `Hello` [X Username]. Attackers are able to inject iframes, img sources with onload alert or other script code tags. The service does not encode the input and has also no input restriction. After the code has been saved during the registration the internal service takes the wrong encoded dbms entries and stream them back in a notification mail to the users inbox. The security risk of the persistent input validation web vulnerability in the mail encoding of the web-server is estimated as medium with a cvss (common vulnerability scoring system) count of 3.6. If the issue is existing in the main service values the other services can be affected by the issue too. Exploitation of the mail encoding and web-server validation vulnerability requires low or medium user interaction and no privileged customer application user account. Successful exploitation of the persistent mail encoding web vulnerability results in session hijacking, persistent phishing attacks, persistent redirects to external malicious source and persistent manipulation of affected or connected module context. Request Method(s): [+] POST Vulnerable Module(s): [+] signups Vulnerable Parameter(s): [+] firstname [+] lastname Affected Module(s): [+] Welcome to Blinksale! Proof of Concept (PoC): ======================= The application-side mail encoding web vulnerability can be exploited by remote attackers with low privileged application user accounta and low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. 1. Open the signup website of the blinksale portal (https://application.blinksale.com/signups) 2. Include random values to the email, password and inject a script code payload as firstname and lastname to the input fields. Save! 3. Go to the mail inbox and wait for the automatic reply with the persistent injected script code 4. Successful reproduce of the remote mail encoding vulnerability Note: The issue can stream persistent malicious context in mails to existing users, new users or random emails to phish or spam! PoC: Welcome to Blinksale!
Hello "><[APPLICATION-SIDE SCRIPT CODE EXECUTION VULNERABILITY!]iframe src="a" onload='alert("PENTEST")'>Welcome to Blinksale, the easiest way to send invoices online! Please save this email as it contains important information about your account. Your Account Details:
|