asd
HomeBug BountySecurity Researcher Share His Experience About Privilege Escalation to Super Admin by...

Security Researcher Share His Experience About Privilege Escalation to Super Admin by XSS

What is Privilege Escalation Vulnerability ?

Privilege escalation is a security vulnerability that allows attackers to gain higher user privileges. This can result in unauthorized access and manipulation of sensitive data.

 

The Story

Asem Eleraky, a security researcher also known as Melotover, has discovered a way to exploit a Reflected XSS vulnerability to gain Super Admin privileges. The researcher found the vulnerability while exploring the subdomain of a private program, referred to as example.com.

Asem attempted to exploit the vulnerability by adding javascript code to the referer parameter of the URL, which had no validation, and successfully found a Reflected XSS vulnerability of P3 severity.

Further exploration led to the discovery of a function that allows the sending of an invitation to add a user as a Super Admin privileged user.

To exploit the function, Asem had to gather important information such as the PID of the current user, the X-Example-CSRF header with a CSRF value, and the JSON format request body containing the email of the user to be invited, as well as the role of the invited user. However, this information was missing, so the researcher had to dig deeper to gather the necessary information..

Asem found that the cookie parameters had useful information like the PID of the user in the USER_ID parameter and the CSRF value in the example-csrf cookie parameter.

With all the necessary information, Asem wrote a javascript payload that made the whole process of the exploit possible. The payload was used to send a link to the victim, and when the victim clicked on the link, Asem gained Super Admin privileges on the victim’s account.

 

How to Prevent Privilege Escalation Vulnerability?

To prevent this type of vulnerability, here are some steps that can be taken:

  1. Regularly update and patch software and applications to ensure that known vulnerabilities are addressed.
  2. Implement strong access controls and permissions management, such as least privilege, role-based access control (RBAC), and separation of duties.
  3. Use secure coding practices to avoid common programming errors that can lead to privilege escalation vulnerabilities, such as input validation, output encoding, and proper error handling.
  4. Conduct regular security assessments and penetration testing to identify potential vulnerabilities and address them before they can be exploited by attackers.
  5. Implement network segmentation and isolation to limit the impact of a potential attack.
  6. Monitor system logs and user activity to detect and respond to potential privilege escalation attempts.

By following these steps, organizations can help reduce the risk of privilege escalation vulnerabilities and protect their systems and data from unauthorized access and exploitation.

 

 

Link to read full write up: here

Save the PDF here

 

Christin
Christinhttps://secry.me/explore
A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

six − one =

Most Popular

GOOGLE ADVERTISEMENT

- Advertisement -