EC RI
A E MEN
__________
No ember 6, 2019 CONF DENT AL
De crip ion
Thi d c e de ai he ce a d e f a PC e e ai e e f ed b
Hac e O e beha f f E C be ee Oc be 23 2019 a d N e be 6, 2019.
A hor
Sh ie Libe , C SSP, OSCP (Tech ica P g a Ma age , Hac e O e)
h ie@hac e e.c
Ab Hac e O e
Hacke O e i ed b e 1,350 ga i a i ld ide da d ec i
l e abili ie i g he la ge ea f ec i e ea che he la e .
1
Table of contents
1. Executive summar 3
S a e f ec i 4
Rec e da i 5
2. Methodolog 7
2.1 P e a a i ha e 7
2.1.1 Sc e 8
2.1.2 Te a 8
2.2 Te i g ha e 9
2.2.1 f ai ga he i g & ec ai a ce 9
2.2.2 Pe e a i e i g&e iai 9
2.3 Re e i g ha e 10
2.4 Re ha e 10
2.5 V e abi i c a i ca i a d e e i 10
2.6 Hac e O e e i g e gage e eade 11
2.7 Hac e O e Pe e ea 12
3. Findings 14
3.1 Fi di g e ie 14
3.2 A e : e c .c 16
3.2.1 A e a 16
3.2.2 V e abi i a 16
3.3 A e : a i.e c .c 17
3.3.1 A e a 17
3.3.2 V e abi i a 17
3.4 A e : a e .e c .c 17
3.4.1 A e a 17
3.4.2 V e abi i a 18
4. Remediation status 19
2
1. Executive summary
______
E C (E a C a , .) a Ha O a Ha O a
, O b 23, 2019 N b 6, 2019. D a ,9 ab
b 8 a .
T a a a a a b a a
ab a b OWASP (O W b
A a S P )T 10. a a , a a
ab a (P ) .B a a a a a
,E C 80 a a
b .
D a ,3 ab a a a CVSS a 7.0 ,
a a.T ab a a
E C a b a . Tab 1 a a
b a b a .S 2.5 a a
a a .
C a H M L N
. 0 1 3 2 0 6
a . . 1 1 1 0 0 3
a . . 0 0 0 0 0 0
1 2 4 2 0 9
3
F mi c mm ni f en e e , Hacke One c a ed a eam f h ee en e e h e
kill and in e e align be i h he na e fE C m b ine and he e fa e
in c ef hi ene a i n e . The eam f h ee - led b a lead en e e - f c ed n
iden if ing lne abili ie in E C m c ed ing he ag eed- n e ing ind .
Cha e 2 c n ain m e inf ma i n ab he ene a i n e ing me h d l g ha a
ed in hi engagemen .
S a e of ec i
Main aining a heal h ec i e e i e c n an e ie and e nemen f e i ing
ec i ce e . R nning a Hacke One Pen e all E C m in e nal ec i eam
n nl nc e eci c lne abili ie b gain a be e nde anding f he c en
ec i h ea land ca e.
4
ac i e a ach he c ib e f e g he ec i e fE C
a e .
Rec mme da i
Ba ed he e f hi a e e , Hac e O e ha he f i g high- e e e
ec e da i .
KEY RECOMMENDAT ON 1
K E c ha i e i jec i e abi i ie e e ac i e ie .
The e e abi i ie c d a a a ac e e a ea c de ia
da a, eadi g e a i a da age, a e a e ia eg a e .
R c a e e ac i e a ach i a ida i ac he a f
a d c ea e QA a d c di g a da d g ide i e e e ha i i
adhe ed . ac ice, hi h d i c de a da ai i g i h he
de e e ea . Thi ai i g h d f c he i e e f
i jec i e abi i ie a d c i iga i a ai ab e.
F he e, he e a e a i addi i a c ch a C e
Sec i P ic (CSP), ha ca a a i e c ie - ide i jec i
e abi i ie if he a e accide a i d ced.
G g e CSP E a a ca be ed e ie c e ec i icie
e e i e ec i e e : h ://c -e a a . i hg g e.c /.
KEY RECOMMENDAT ON 2
K E c AP d e ha e a acce c de ha i c i e ih
i eb i e face. Thi ea ha e c d e ec e a h i ed
ac i i he AP , ca i g da age da a a d e i eg i . Thi c d
c E c b h e a da age i a e ce e i ed
e edia e he e i f ac i ,a e a e a i a da age if he i e
e e bec e b ic.
5
Rec mme da i Use a consistent permissions model for all areas of the application, and
ens re that there is a single area that contains the a thoritati e
permissions model that can be referred to b the component
applications.
6
2. Me hodolog
______
● gai a e ie f he A lica i a d e k c m e i g he
Ca dh lde Da a E i me (CDE);
● de el a c ef he e gageme ;
● de e mi e ha e e mi i le el e i a d hich e a ei c e;
● de e mi e a cie e i g i d ;
● de e mi e he i k le el a cia ed i h each a e ;
● ga he ha eable d c me a i c e i g E C m AP a d e ice ;
● ide if he a ea fE C m c e ha e ea che h ld a ecial a e i ;
● a d ha e f l e abili ie E C m i m i e e ed i e i gf .
7
D i g he e a ai ha e a e i g i d f m Oc be 23, 2019 N embe 6,
2019 a ag eed . The c e f he Sec i Page e ea ed b E C m bef e
m i g he e i g ha e.
2.1.1 Sc e
D i g he e a ai ha e he f ll i g c ef he e gageme a ag eed :
A E N COPE
e c m.c m
a i.e c m.c m
a me .e c m.c m
A E O OF COPE
.e c m.c m
2.1.2 Te la
The e ea che i he ec i e i g eam e e able c ea e a d e hei
acc i de e f l e abili ie i hi he ag eed- c e. The e a
e i ge i me e f he hacke , all e i g a e f med a d ci
e i me .
8
2.2 Te g ha e
2.2.1 a a e & ec a a ce
T e a a e a d ec a a ce e ec ca a e e
e ea c e . T e ed e e eb da e e a e c e a d de e
a a a ac . Eac e be e ec e ea c ea ce ed be c ea e
c e a a a e bee ed c e a ec a a ce e a d ,
e e d e a d ec e .T c de b ed :
● C e a a d ba e ca c a a a d a ca
● DNS d c e a d bd a e e a
● Re e ce ca e a a e c ec d
● E a S da a d Ce b c da a
● E e a be dde eb d ec e
● C e de a dc a c a B S e
Hac e O e e ac ae e b d e e e ea e
d c e a a d de a ac e c e e e ce e a e a e
ed b a ca c e .
2.2.2 Pe e a e &e a
T e e e a e e d a Oc be 23, 2019 N e be 6, 2019 a d a
eb ed a 100 .
Hac e O e e e a e e d a e ec c ca e e e ab e ,
c a e OWASP (O e Web A ca Sec P ec ) T 10. O e
e d e e d e e , ea ca ae ea - d a ac ,
e a e ed c e e ab e, ac , e ab e ,a d e e e
e de e a d ec e .
9
lne abili ie again he CWE (C mm n Weakne En me a i n) anda d, a ell a
a ign a e e i a ing ba ed n he CVSS 3.0 (C mm n V lne abili Sc ing S em)
anda d, iding c n i en , ea nde and g ideline n he e e i f each
nding. Each nding a made a ailable immedia el E C m h gh Hacke One
lne abili managemen la f m.
2.3 Re e i g ha e
While E C m ked e l e an iden i ed lne abili ie , Hacke One kicked a ee
f h e nding en e he a e n l nge e d cible. Each nding a alida ed b
he iginal nde en e he lne abili a mi iga ed e l . The e l f he
e e ing ha e a e lined in cha e 4.
2.4 Re ha e
A he c ncl i n f he engagemen , Hacke One ked i hE C m anal e he e l
f he e ing ha e and iden if an en ial end in lne abili ie f nd ac
E C m a e and ke ec mmenda i n . The e l f he engagemen and
-engagemen anal i e e hen mma i ed in hi e . The nal e a
di c ed i h and a ed b E C m d ing an engagemen a - mee ing.
2.5 V e abi i c a i ca i a d e e i
T ca eg i e lne abili ie acc ding a c mm nl nde d lne abili a n m ,
Hacke One e he ind anda d C mm n Weakne En me a i n (CWE). CWE i a
c mm ni -de el ed a n m f c mm n f a e ec i eakne e . e e a a
c mm n lang age, a mea ing ick f f a e ec i l , and a a ba eline f
eakne iden i ca i n, mi iga i n, and e en i n e .
10
T a a , Ha O a a C
V a S S (CVSS) a a a
a . CVSS a a a a a a a a ,
a a a ,a a a a a
a .
T a a a a a a ,
Ha O a a a CVSS a a a a a ( a
, , a a ):
● C ca : CVSS a 9.0 - 10
● H : CVSS a 7.0 - 8.9
● M d : CVSS a 4.0 - 6.9
● L : CVSS a 0.1 - 3.9
● N : CVSS a 0.0
M a a CVSS a F R a
S T a (F RST) : :// . . / .
● S Lb , C SSP, OSCP, T a P a Ma a
@ a .
D a a a :
● Zac a Da d , S A a Ma a
a @ a .
● J B a ,T a P a Ma a
11
@ a .
● J a in Sil a J ., T a P a Ma a
a @ a .
P a a a a ab a
.
3 52 2,056
Ha O P T a Ha O C T a V ab F
E a W O Ha O C
T a b a a - a 3 a a b
12 a a 52 Ha O a .
T , a a a a 2,056 ab , 4069
a , a a Sa b ,G a M ,G a Sa ,
H a ,a U.S. D a D .
12
@ _ o_hack
3 ears and 10 mon hs of sec ri es ing e perience ih
HackerOne
13
3. Findings
______
T c a c a c a .F a b
a b a a CWE c a ca . Eac a c c a a
a . Tab 1 c a c a a b
c ab a ca .A
Hac O a , c a a c a
ab a ca b a ab ac a
c b a ab a .
● C -S Sc (XSS)
● S -S R F (SSRF)
● C -S R F (CSRF)
● a D c
● S c M c a
● P E ca a
Tab 4 a a a E C a a a c
ab a b OWASP T 10.
14
E
O A O 10 CA EGO F ND NG
E L
A1 – njection
A2 – Broken Authentication
A8 – nsecure Deserialization
Tab e 4: e ab e b OWASP T 10 ca eg
Exploring the ndings further by their actual vulnerability type as de ned by CWE, Table 5
shows the number of individual ndings and its distribution of severity.
15
Table 5: se eri dis rib ion across lnerabili pes
:
● E .
● . .
T :
● . .
3.2 A e : e c .c
3.2.1 A
. E C .
E C .
3.2.2
D ,6 .
#171870 S SS
H (8.0) C -S S ( SS)
C -S R
#198328 CSRF L (2.1)
F (CSRF)
S
#168325 A U L (2.1)
M
16
Table 6: nding in e c m.c m
3.3.1 A a
a . . a a AP b E .U a
AP a a a a a b
a . .T AP a a a E
.
3.3.2 V ab a
D a ,3 ab a .
S -S R
#189172 SSRF E a H (7.5)
F (SSRF)
#178822 AP a a G H b M (4.3) a D
3.4.1 A a
a . . E C a a a
b .
17
3.4.2 V e ab a
D g e e gage e , e ab e e ef d a e.
18
4. Re edia i a
E C H O
.E
.T 8
.
LNERAB L LE SE ER S A S
#168325 A U L (2.1) N
19
End of Sec i A e men Repo
20