Bitcoin Forum
May 05, 2024, 01:38:03 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: --  (Read 646 times)
Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
--
May 09, 2020, 08:33:00 AM
Last edit: July 10, 2020, 03:32:10 AM by Boris007
Merited by 3x2 (34), LoyceV (2)
 #1

--

No Gods or Kings. Only Bitcoin
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714873083
Hero Member
*
Offline Offline

Posts: 1714873083

View Profile Personal Message (Offline)

Ignore
1714873083
Reply with quote  #2

1714873083
Report to moderator
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
May 09, 2020, 01:42:11 PM
 #2

Description of subType of the issue:

X-XSS-Protection: 0

This behavior does not in itself constitute a vulnerability; in some cases XSS filters may themselves be leveraged to perform attacks against application users. However, in typical situations XSS filters do provide basic protection for application users against some XSS vulnerabilities in applications. The presence of this header should be reviewed to establish whether it affects the application's security posture.

Issue remediation

Review whether the application needs to disable XSS filters. In most cases you can gain the protection provided by XSS filters without the associated risks by using the following response header:

X-XSS-Protection: 1; mode=block

When this header is set, browsers that detect an XSS attack will simply render a blank page instead of attempting to sanitize the injected script. This behavior is considerably less likely to introduce new security issues.


The X-XSS-Protection header isn't really needed.
It isn't even implemented in firefox.

It can be quite helpful with old browsers, but is pretty much useless since such things should be handled with CSP.



I am pasting the response from the server and some part of the request.

I was able to get the list directory /.../etc/passwd with the payload though the information was encrypted as inside that folder I was not able to go.

<!ENTITY % parameter9 "-------retracted----

Payload with the hidden script: https://forum.stake.com/uploads/monthly_2020_05/payload.thumb.PNG.e582e1770e4dc9fb6ee69225efdb410a.PNG

Response: https://forum.stake.com/uploads/monthly_2020_05/response.thumb.PNG.05b58139d32afc4c68f2bf7961a7e1f6.PNG

I was able to get the client IP address, Server details.

I can't verify this since a permission from the owner is required to test anything which is related to injecting scripts/commands.

Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
May 09, 2020, 01:45:54 PM
 #3

Description of subType of the issue:

X-XSS-Protection: 0

This behavior does not in itself constitute a vulnerability; in some cases XSS filters may themselves be leveraged to perform attacks against application users. However, in typical situations XSS filters do provide basic protection for application users against some XSS vulnerabilities in applications. The presence of this header should be reviewed to establish whether it affects the application's security posture.

Issue remediation

Review whether the application needs to disable XSS filters. In most cases you can gain the protection provided by XSS filters without the associated risks by using the following response header:

X-XSS-Protection: 1; mode=block

When this header is set, browsers that detect an XSS attack will simply render a blank page instead of attempting to sanitize the injected script. This behavior is considerably less likely to introduce new security issues.


The X-XSS-Protection header isn't really needed.
It isn't even implemented in firefox.

It can be quite helpful with old browsers, but is pretty much useless since such things should be handled with CSP.



I am pasting the response from the server and some part of the request.

I was able to get the list directory /.../etc/passwd with the payload though the information was encrypted as inside that folder I was not able to go.

<!ENTITY % parameter9 "-------retracted----

Payload with the hidden script: https://forum.stake.com/uploads/monthly_2020_05/payload.thumb.PNG.e582e1770e4dc9fb6ee69225efdb410a.PNG

Response: https://forum.stake.com/uploads/monthly_2020_05/response.thumb.PNG.05b58139d32afc4c68f2bf7961a7e1f6.PNG

I was able to get the client IP address, Server details.

I can't verify this since a permission from the owner is required to test anything which is related to injecting scripts/commands.

I dont have permission to inject scripts either, yet I was able to do so.

bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
May 09, 2020, 01:50:36 PM
 #4

I dont have permission to inject scripts either, yet I was able to do so.

Then.. what you did was illegal.

I don't know which country you are from. But the server is hosted by amazon in the US.
And when pentesting a service hosted by amazon, you don't only need the permission from the owner of the website, but also from amazon.

If you don't have both of them, you can be made liable for your actions.


Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
May 09, 2020, 01:53:15 PM
Merited by LoyceV (2)
 #5

I dont have permission to inject scripts either, yet I was able to do so.

Then.. what you did was illegal.

I don't know which country you are from. But the server is hosted by amazon in the US.
And when pentesting a service hosted by amazon, you don't only need the permission from the owner of the website, but also from amazon.

If you don't have both of them, you can be made liable for your actions.


I work as part a security analyst and finding bugs and reporting is my side hustle.
I have passed relevant information to owners and this thread is as a proof.
Good day.

3x2
Legendary
*
Offline Offline

Activity: 1526
Merit: 1004



View Profile
June 01, 2020, 06:22:48 AM
 #6

I agree with you on vulnerability but there is hardly anything that you can do over forum.stake.com with that, but if you could do some xss attack on stake.com then it might impact them and then you can get reasonable bounty.
NotATether
Legendary
*
Offline Offline

Activity: 1596
Merit: 6728


bitcoincleanup.com / bitmixlist.org


View Profile WWW
June 01, 2020, 10:12:40 AM
Merited by nutildah (1)
 #7

I work as part a security analyst and finding bugs and reporting is my side hustle.
I have passed relevant information to owners and this thread is as a proof.
Good day.

Did you notify the administrators of this vulnerability? Most sites have a vulnerability disclosure program which is a process of sending them details of the vulnerability without leaking important details of it to outsiders. It's possible they will fix it faster if you notify them like that.

Here, the admin of Stake even mentions that they will pay people big money who report these kinds of exploits https://forum.stake.com/topic/15307-rewards-for-bug-reports/?do=findComment&comment=172655

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
June 10, 2020, 04:17:13 PM
Last edit: July 10, 2020, 03:32:56 AM by Boris007
Merited by LoyceV (2), Harkorede (1)
 #8

--

Harkorede
Copper Member
Hero Member
*****
Offline Offline

Activity: 2072
Merit: 795



View Profile WWW
June 10, 2020, 05:20:04 PM
 #9

Update:

Rewarded 700 USD for the bug.

Thank you.

Good platforms indeed always value these types of information, although it migh take a while to get things processed. But it's very good of stake.com to have acknowledged the bug.


It's right about time to lock the thread, you'll find the option to do so in the buttom corner of the thread, also edit the topic title and Include [SOLVED or CLOSED]

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!