diff --git a/CVEs/2021/CVE-2021-36873.md b/CVEs/2021/CVE-2021-36873.md index d1e6c6c..9f50cf7 100644 --- a/CVEs/2021/CVE-2021-36873.md +++ b/CVEs/2021/CVE-2021-36873.md @@ -1,7 +1,7 @@ # CVE-2021-36873 ## Description -Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: &blockcountry_blockmessage. +Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: `&blockcountry_blockmessage`. ## CVSS (Vector and Score) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N - 5.5 MEDIUM @@ -17,9 +17,14 @@ WordPress iQ Block Country plugin ## Steps to Reproduce 1. Login as administrator -2. - +2. Go to http://localhost/wp-admin/options-general.php?page=iq-block-country%2Flibs%2Fblockcountry-settings.php +3. Find `Message to display when people are blocked:` form +4. Input `` +5. Scroll down and press `Save Changes` button ## Proof of Concept +- Video + + > https://youtu.be/WtOiHY5R-t0 - Image -- Video \ No newline at end of file +![image](https://user-images.githubusercontent.com/36522826/202700374-52d36350-adff-4fe3-b46d-21f08955e8c6.png) \ No newline at end of file diff --git a/OAuth Misconfiguration.md b/OAuth Misconfiguration.md index bb50ba4..a47971c 100644 --- a/OAuth Misconfiguration.md +++ b/OAuth Misconfiguration.md @@ -4,21 +4,46 @@ The most infamous OAuth-based vulnerability is when the configuration of the OAuth service itself enables attackers to steal authorization codes or access tokens associated with other users’ accounts. By stealing a valid code or token, the attacker may be able to access the victim's account. ## Where to find -In the SSO feature. For example `Log in with google` or `Log in with facebook`. +In the SSO feature. For example the URL will be looks like this +``` +https://example/signin?response_type=code&redirect_uri=https://callback_url/auth&client_id=FQ9RGtMkztAgmAApKOqACrBNq&state=7tvPJiv8StrAqo9IQE9xsJaDso4&scope=+profile+email+phone+group+role+resource +``` ## How to exploit -1. OAuth token stealing: Changing redirect_uri to attacker.com(Use IDN Homograph or common bypasses). -2. Change Referral header to attacker.com while requesting OAuth. -3. Create an account with victim@gmail.com with normal functionality. Create account with victim@gmail.com using OAuth functionality. Now try to login using previous credentials. -4. OAuth Token Re-use. -5. Missing or broken state parameter. -6. Lack of origin check. -7. Open Redirection on another endpoint > Use it in redirect_uri -8. If there is an email parameter after signin then try to change the email parameter to victim's one. -9. Try to remove email from the scope and add victim's email manually. -10. Only company's email is allowed? > Try to replace hd=company.com to hd=gmail.com -11. Check if its leaking client_secret parameter. -12. Go to the browser history and check if the token is there. +1. OAuth token stealing by changing `redirect_uri` and Use IDN Homograph + * Normal parameter + ``` + &redirect_uri=https://example.com + ``` + * IDN Homograph + ``` + &redirect_uri=https://еxamplе.com + ``` + If you notice, im not using the normal `e` +2. Create an account with victim@gmail.com with normal functionality. Create account with victim@gmail.com using OAuth functionality. Now try to login using previous credentials. +3. OAuth Token Re-use. +4. Improper handling of state parameter + + To exploit this, go through the authorization process under your account and pause immediately after authorization. Then send this URL to the logged-in victim + * CSRF Attack + ```html + Press Here + ``` +5. Lack of origin check. +6. Open Redirection on `redirect_uri` parameter + * Normal parameter + ``` + &redirect_uri=https://example.com + ``` + * Open Redirect + ``` + &redirect_uri=https://evil.com + &redirect_uri=https://example.com.evil.com + etc. + ``` +7. If there is an email parameter after signin then try to change the email parameter to victim's one. +8. Try to remove email from the scope and add victim's email manually. +9. Check if its leaking `client_secret` ## References * [tuhin1729_](https://twitter.com/tuhin1729_/status/1417843523177484292)