Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Group Validation Bypass via EC config header manipulation #125

Open
Gayatri212 opened this issue Jul 24, 2020 · 0 comments
Open

Group Validation Bypass via EC config header manipulation #125

Gayatri212 opened this issue Jul 24, 2020 · 0 comments
Assignees
Labels
enhancement New feature or request pentest proxy Issues related to proxy security
Milestone

Comments

@Gayatri212
Copy link

GE Digital Security Vulnerability Report [3699]

This is part of the security item or pen test result for EC product.

  • The agent(client/server) validation is done by checking aid, tid and groupid generated by service with {version}/admin/accounts/validate endpoint
  • This endpoint takes the ids info as EC-config header in the request
  • While making this request if the request is going through proxy the pen test team was able to fetch the EC-config header decode it and change values of ids encode the header again and continue request
  • If the ids are changed gateway throws error so connection does not happen but the ask is the ids info should not be fetch-able from EC-config header of the /validate api
  • So before embedding info to URLs sanitize the input
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request pentest proxy Issues related to proxy security
Projects
None yet
Development

No branches or pull requests

3 participants