13.5 Lab: Exploiting server-side parameter pollution in a REST URL
To solve the lab, log in as the administrator and delete carlos. You’ll need to know: How to identify whether a user input is included in a server-side URL path or query string. How to use path traversal sequences to attempt to change a server-side request. How to discover API documentation. These points are covered in our API Testing Academy topic | Karthikeyan Nagaraj
4 min readJul 18, 2024
Description
To solve the lab, log in as the administrator
and delete carlos
.
Required knowledge
To solve this lab, you’ll need to know:
- How to identify whether a user input is included in a server-side URL path or query string.
- How to use path traversal sequences to attempt to change a server-side request.
- How to discover API documentation.
These points are covered in our API Testing Academy topic.
Solution
- In Burp’s browser, trigger a password reset for the
administrator
user. - In Proxy > HTTP history, notice the
POST /forgot-password
request and the related/static/js/forgotPassword.js
JavaScript file. - Right-click the
POST /forgot-password
request and select Send to Repeater. - In the Repeater tab, resend the request to confirm that the response is consistent.
- Send a variety of requests with a modified username parameter value to determine whether the input is placed in the URL path of a server-side request without escaping:
- Submit URL-encoded
administrator#
as the value of theusername
parameter.
Notice that this returns anInvalid route
error message. This suggests that the server may have placed the input in the path of a server-side request, and that the fragment has truncated some trailing data. Observe that the message also refers to an API definition. - Change the value of the username parameter from
administrator%23
to URL-encodedadministrator?
, then send the request.
Notice that this also returns anInvalid route
error message. This suggests that the input may be placed in a URL path, as the?
character indicates the start of the query string and therefore truncates the URL path. - Change the value of the
username
parameter fromadministrator%3F
to./administrator
then send the request.
Notice that this returns the original response. This suggests that the request may have accessed the same URL path as the original request. This further indicates that the input may be placed in the URL path. - Change the value of the username parameter from
./administrator
to../administrator
, then send the request.
Notice that this returns anInvalid route
error message. This suggests that the request may have accessed an invalid URL path.
Navigate to the API definition
- Change the value of the username parameter from
../administrator
to../%23
. Notice theInvalid route
response. - Incrementally add further
../
sequences until you reach../../../../%23
Notice that this returns aNot found
response. This indicates that you've navigated outside the API root. - At this level, add some common API definition filenames to the URL path. For example, submit the following:
username=../../../../openapi.json%23
- Notice that this returns an error message, which contains the following API endpoint for finding users:
/api/internal/v1/users/{username}/field/{field}
- Notice that this endpoint indicates that the URL path includes a parameter called
field
.
Exploit the vulnerability
- Update the value of the
username
parameter, using the structure of the identified endpoint. Add an invalid value for thefield
parameter:username=administrator/field/foo%23
- Send the request. Notice that this returns an error message, because the API only supports the email field.
- Add
email
as the value of thefield
parameter:username=administrator/field/email%23
- Send the request. Notice that this returns the original response. This may indicate that the server-side application recognizes the injected
field
parameter and thatemail
is a valid field type. - In Proxy > HTTP history, review the
/static/js/forgotPassword.js
JavaScript file. Identify the password reset endpoint, which refers to thepasswordResetToken
parameter:/forgot-password?passwordResetToken=${resetToken}
- In the Repeater tab, change the value of the
field
parameter fromemail
topasswordResetToken
:username=administrator/field/passwordResetToken%23
- Send the request. Notice that this returns an error message, because the
passwordResetToken
parameter is not supported by the version of the API that is set by the application. - Using the
/api/
endpoint that you identified earlier, change the version of the API in the value of theusername
parameter:username=../../v1/users/administrator/field/passwordResetToken%23
- Send the request. Notice that this returns a password reset token. Make a note of this.
- In Burp’s browser, enter the password reset endpoint in the address bar. Add your password reset token as the value of the
reset_token
parameter. For example:/forgot-password?passwordResetToken=123456789
Set a new password. - Log in as the
administrator
using your password. - Go to the Admin panel and delete
carlos
to solve the lab.
A YouTube Channel for Cybersecurity Lab’s Poc and Write-ups
Github for Resources:
Telegram Channel for Free Ethical Hacking Dumps
Thank you for Reading!
Happy Ethical Hacking ~
Author: Karthikeyan Nagaraj ~ Cyberw1ng