A Journey from IDOR to Account Takeover

Today I’ll be discussing about the IDOR (insecure direct object reference) vulnerability in an application. Where I was able to take over the account via email change confirmation link. I’ll be referring the target company as a pyrus.com.

What is an IDOR?

There can be many variables in the application such as “id”, “pid”, “uid”. Although these values are often seen as HTTP parameters, they can be found in headers and cookies. The attacker can access, edit or delete any of other users’ objects by changing the values. This vulnerability is called IDOR. If there is UUID. There is rare chance to get the IDOR, unless it’s leaking in URL or any other location

Common places to find IDOR

Most of the time people tries to find out IDOR on update profile section and there are many chances that profile section would be secured against IDOR. As this is the prime module to breach the PII data. Now question arises, where do I find IDOR?

Well this entirely depend upon the application structure and functionality. The more functionality will lead you will discover the hidden IDOR which would be even more complex to understand as per developers perspective.
If you are getting 403 on POST /api/user/1234 that is updating the profile. Try to convert request in GET method and see you can see the users details unauthenticated

For POST request body. A parameter name can be anything as per the application. For example you have created an assessment in an education portal. Then it would be assessment_id or it vary on the different component of application.

If you require uuids to finish the IDOR exploitation, look through the same relevant mobile API endpoints for the webapp.

Add .json to the end of the URL to get the data. For instance, api/v1/user/1234.json

Change the api version from v1 to v2.

![Image](/static/images/remoteblogs/arjuns/idor-to-account-takeover/image%20to%20elaborate.PNG)

On my way to hunt IDOR

![Image1](/static/images/remoteblogs/arjuns/idor-to-account-takeover/idor%20hunting.PNG)
What was the feature, which leads to discover IDOR?
So, there was feature, where user can sign up to the account without setting up password, setting up the password was later part after logging in. Even if the user wants change the email, a verification link will be sent to registered email. Now here the game was started

Few Pre-requisites before proceeding for this attack

Enumerable ID

Verification Email Link visible in URL

Victim must not setup password, after register

Step to Reproduce

As an attacker, I signup into the application

after setting password, there was an email change functionality

I went to the change email functionality.

![Image3](/static/images/remoteblogs/arjuns/idor-to-account-takeover/1st%20step.PNG)
After entering the new email ID, I got the confirmation link

![Image4](/static/images/remoteblogs/arjuns/idor-to-account-takeover/2nd%20step%20-%20Copy.PNG)
Now in the above image, there is a UserID parameter, which was vulnerable to IDOR attack, I enumerate the ID with victim’s ID.

So far, we have done everything from the attacker point of view. Now it’s time to proceed with victim’s account
Here, I logged as a victim’s account, I haven’t setup the password yet. As soon as victim’s open the attackers given link (UserID parameter’s value containing the victim’s ID only ) the system will change the victim’s email from backend, but from UI, email will remain same. Now whenever victim tries to setup password. A password setup will be sent to attacker’s new email that is [email protected] shown in above image.

Below URL in image is edited with parameter. we have enumerate the victim’s ID in it.

![Image5](/static/images/remoteblogs/arjuns/idor-to-account-takeover/step%203.PNG)

Takeaway keys

When you are testing an application, make sure to note ID’s on password reset and email verification.

Understand the application’s workflow is goldmine and you will eventually find vulnerability, once you are familiar

Note down if the application is assigning UUID. Try to find if it’s leaking in response error.

Do not limit yourself to understand the application, take your time and eventually you will be able to find IDOR

Last but not least. In rare cases like above it may be possible. An application has a feature to setup password after signup

About Payatu

Payatu is a Research Focused, CERT-In impaneled Cybersecurity Consulting company specializing in security assessments of IoT product ecosystem, Web application & Network with a proven track record of securing applications and infrastructure for customers across 20+ countries.

Subscribe to our Newsletter
Subscription Form
DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in few seconds

Ebook Download
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by