Discover how an U.I mistake allowed unauthorized permission changes in Private Program and bypass the membership requirements. Learn the steps to reproduce this security flaw and its potential impact on platform and user privacy.
Understanding Target
ExamFront (Virtual name Of a Private Program) stands out as a specialized space for managing deals, partnerships, and collaborations. This platform is designed to streamline the intricate processes involved in deal-making, offering a centralized hub for organizations to orchestrate their business agreements seamlessly.
The Flow
Typically, when a user is created in the organization, they are granted all the default permissions. To remove these permissions, the organization requires the to obtain membership privileges. However, I have identified a flaw that enables an attacker to bypass this requirement and remove the user’s permissions directly through the UI.
The Flaw in the System
At the heart of this issue lies a subtle manipulation of the user interface (UI). The organization and users of the organization can change the permissions without membership by directly enabling the buttons throught the UI. This flaw pertains to the manipulation of the user interface (UI), offering a unique pathway for unauthorized changes to user permissions. For betterunderstanding check the below steps and PoC:
Before we move on, if you like my write-ups, please support me by liking, sharing, and clapping up to 50 times here on Medium, it’s free. Thank you.
Steps to Reproduce
PoC for better understanding :- https://drive.google.com/file/d/1MmBzz-S4ABVv4-NMKAPGUewpgWGEPrhW/view?usp=sharing
The Bounty
In acknowledgment of uncovering the UI vulnerability within ExamFront, the bug bounty program has duly rewarded me a bounty of $750.
Takeaway
This discovery highlights how crucial it is to carefully examine user interfaces for cybersecurity. The main lesson is simple — small changes in the User Interface might seem harmless but can actually put user permissions at significant risk. Whether you’re a security researcher or a developer, it’s important to stay alert. Even a minor mistake in the UI can lead to serious consequences.
Leave some clap if you enjoyed this read, leave your feedback in comment and consider following me for more exciting findings.
Find me on Twitter: @a13h1_
Keep Supporting, Keep Clapping, Keep Commenting.