How a Newline Injection in Folder Names Broke Access Revocation: 750$ Bug
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容和关键点。 文章主要讲的是CollabSpace平台的一个漏洞。攻击者通过在文件夹名称中注入换行符(%0a),导致系统无法正确处理权限撤销。这使得攻击者能够永久保留编辑权限,而所有者无法删除恶意文件夹或撤销访问权限。 接下来,我需要提取关键信息:CollabSpace平台、文件夹名称中的换行符注入、权限撤销失败、攻击者保留权限、所有者失去控制权。 然后,我需要用简洁的语言把这些点整合起来,确保不超过100字。同时,避免使用“文章内容总结”之类的开头语,直接描述内容。 最后,检查字数是否符合要求,并确保表达清晰准确。 </think> CollabSpace平台因文件夹名称中的换行符注入导致权限撤销失败,攻击者可永久保留编辑权限,所有者无法删除恶意文件夹或撤销访问。 2026-4-24 10:4:48 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Abhi Sharma

Sometimes the smallest input validation issues can snowball into serious business logic flaws. This bug is a great example — a simple newline character (%0a) in a folder name was enough to block owners from revoking access rights, leaving attackers stuck with elevated privileges.

Press enter or click to view image in full size

Understanding the Target

CollabSpace(pseudo name for private bbp product) is a cloud-based platform for project collaboration, offering resource sharing, folder management, and granular access controls. Owners can share resources and grant collaborators rights such as View, Edit, or Transfer Edit Rights.

To maintain control, project owners should always be able to revoke or update collaborator access. However, this restriction was bypassed by abusing folder naming logic.

The Flaw: Newline Injection in Folder Names

The vulnerability occurred because the backend failed to validate folder names properly. By creating a folder with a newline character (%0a) at the start of its name, the system broke critical permission workflows.

Get Abhi Sharma’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

Here’s the malicious request:

POST /api/v1/fs?path=&rid=<resource_id>&dirname=%0aattackerfolder HTTP/2
Host: collabspace.com

This created a folder with a malformed name that disrupted backend path handling.

Steps to Reproduce

  1. Owner grants Transfer Edit Rights to a collaborator (attacker).
  2. Attacker(editor user) creates a folder with %0a at the start of the folder name.
  3. Owner attempts to revoke rights or delete the folder
  • This action fails due to backend errors triggered by the malformed folder name.

Result: The attacker retains their access indefinitely.

Impact

  • Persistent Access: Attackers could keep edit rights permanently.
  • Denial of Control: Owners couldn’t revoke access or delete malicious folders.
  • Workflow Disruption: Ownership revocation logic was effectively broken.
  • Potential Abuse: Attackers could create multiple such folders, locking down workspaces.

Bounty & Program Response

  • Reported: July 7, 2025
  • Triaged: July 9, 2025
  • Severity: High (8.5) → downgraded to Medium (6.0)
  • Bounty Awarded: $500 + $250 bonus

The program acknowledged that although the confidentiality impact was low, this was a well-crafted and creative finding that broke ownership workflows, which earned a bonus.

Key Takeaways

  • Always check user inputs, including folder and file names.
  • Small oversights in business logic can cause privilege persistence issues.
  • Test boundaries with unusual inputs: newlines, nulls, special characters often reveal flaws.
  • Even if a bug seems minor, well-documented reports can lead to bonus rewards.

Conclusion

This was a unique case where a simple newline injection caused project owners to lose control over collaborator access. It highlights how critical input validation is for access control and ownership workflows.

Until next time, happy hacking! 🚀

Connect and Engage

💬 What’s your experience with business logic bugs?

Follow me on Twitter: @a13h1_

Keep clapping, commenting, and sharing your thoughts — your support motivates me to share more real bug bounty stories!


文章来源: https://infosecwriteups.com/how-a-newline-injection-in-folder-names-broke-access-revocation-750-bug-f9a73a8cd978?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh