Insecure Direct Object Reference (IDOR) found in Stable Help Desk Enterprise #8305
Labels
Customer reported Bug
Support Ticket and Customer reported bugs
Paid
This label considered as a Paid Product issues.
Hii Team
I am Amjad Ali. I want to inform you that I have identified a security issue. I reported this issue to your team via email but have not received any response, so I am raising the issue here.
Description:
During security testing of the "Stable Help Desk Enterprise (v9.2.0)" application via the online demo environment (https://stablehelpdesk.faveodemo.com/), an Insecure Direct Object Reference (IDOR) vulnerability was identified in the "My Tasks" section. This testing was conducted in the demo/testing environment, and no real data or production environment was impacted.
The vulnerability allows unauthorized access to task details by manipulating the thread ID in the URL. By altering the task identifier, an agent can view tasks assigned to other users, leading to a potential data exposure risk. It is advised to address this issue promptly to prevent any unauthorized access in production environments.
An agent can access tasks that do not belong to them by modifying the
thread
ID in the URL, viewing sensitive information without authorization.The application should restrict access to task details based on the logged-in user’s permissions. Users should only be able to access tasks assigned to them and should receive an "Access Denied" or "Unauthorized" response when attempting to view other users’ tasks.
Steps To Reproduce:
[https://stablehelpdesk.faveodemo.com/panel/thread/37
].thread/37
).37
to1
):[https://stablehelpdesk.faveodemo.com/panel/thread/1
].Impact:
This vulnerability can lead to unauthorized access to sensitive task information, potentially exposing details such as:
An attacker could use this information for malicious purposes, compromising data privacy and integrity. The severity of this issue is High due to the potential for sensitive information exposure.
Remediation:
Implement Access Control: Ensure that proper access control checks are in place to validate the user's permissions before granting access to the task details. The backend should verify that the logged-in agent is authorized to view the specified task.
Use Indirect References: Avoid exposing internal identifiers like thread IDs directly in the URL. Instead, use indirect references (e.g., UUIDs or tokens) that cannot be easily guessed or manipulated.
Error Handling: Return a proper error response (e.g., HTTP 403 Forbidden) when a user attempts to access a resource they do not own.
References:
Thanks & Regards
Amjad Ali (Cybersecurity Researcher)
The text was updated successfully, but these errors were encountered: