.

Wednesday 3 December 2014

Full path disclosure at ads.twitter.com [Vulnerability , Reward 140$]



Vulnerability found in ads.twitter.com
Recently Independent Security Researcher Found a Vulnerability in Twitter .I was Really simple vulnerability but we can say its all about eagle eyes .

Twitter Vulnerability Description:
I noticed a small information disclosure (full path disclosure) on ads.twitter.com.




Steps to Reproduce a Vulnerability/Bug :


  • 1. Login to ads.twitter.com
  • 2. Start to create a new twitter-follower campaign
  • 3. Choose to upload a new picture
  • 4. Turn on your intercepting proxy
  • 5. Upload a file
  • 6. You should notice a request to your log facility.


GET /accounts/18ce53wparq/log?v=0.9&u=https%3A%2F%2Fads.twitter.
com%2Faccounts%2Fxxxx%2Fcampaigns%2Fnew_objective%2Ffollowers%3Fsou
rce%3Dobjective_picker&rt.start=cookie&r=https%3A%2F%2Fads.twitter.com 
%2Faccounts%2Fxxxxx%2Fcampaigns%2Fnew&timers=&events=ads%3Afollowers
%3Acreative%3A%3A%3Aenter HTTP/1.1
Host: ads.twitter.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:32.0) Gecko/20100101 
Firefox/32.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://ads.twitter.com/accounts/xxxxx/campaigns/new_objective/
followers?source=objective_picker
Cookie: [COOKIES]
Connection: keep-alive
 
 
The response will contain something like this: 

x-sendfile: /var/lib/mesos/slaves/201403042312-2230002186-5050-50082
-705/frameworks/201104070004-0000002563-0000/executors/thermos-1409
696851527-revenue_web-prod-ads-36-d76baad3-5634-4141-ab52-478be9eca
b97/runs/e09cc5ea-77f8-4729-afd1-0045b2a772c5/sandbox/app/assets
/images/blank.gif


More Info :

As you can see, this discloses a full path to a resource. This information could be used in further attack scenarios like LFI or RCE. 



Thanks.



No comments:

Post a Comment

About

Like Us