Over Permissioned Credentials On Storage
Over-Permissioned Credentials on Storage
Overview of the Vulnerability
The device contains a set of credentials stored on its storage medium that are over-permissioned for their intended use. While these credentials are designed to access a specific shared service, their excessive permissions allow for broader unauthorized access. If the device is compromised or falls into the hands of unauthorized user, these over-permissioned credentials could be used to access not only the intended service but also additional services and data that should be segregated.
Business Impact
Storing over-permissioned credentials on the device presents a significant security risk, amplifying the potential damage from unauthorized access. Attackers could exploit these credentials to gain extensive control over the system's resources and sensitive data, including customer information and proprietary secrets. Such breaches can lead to financial losses, regulatory penalties, erosion of customer trust, and long-term reputational damage to the organization.
Steps to Reproduce
Gain physical access to the device and remove the cover, as seen in the images below: {{screenshot}}
Locate the hard drive on the device and remove it.
Using a external hard drive caddy, remove the hard drive from the device's storage.
Mount the device and extract the credentials from: {{filepath}}
or
Gain remote access to the device via SSH with the following credentials: {{credentials}}
Browse to the file path {{filepath}} and open the file.
On Line 32, you can see the variable: {{JWT}}
Using the HTTP request below, send the request with the token: {{HTTP request}}
Proof of Concept (PoC)
The following screenshot(s) demonstrate(s) this vulnerability:
{{screenshot}}
Guidance
Provide a step-by-step walkthrough with screenshots on how you exploited the vulnerability. This will speed up triage time and result in faster rewards. Please include specific details on where you identified the vulnerability, how you identified it, and what actions you were able to perform as a result.
Attempt to escalate the vulnerability to perform additional actions. If this is possible, provide a full Proof of Concept (PoC).
Recommendation(s)
It is recommended to strictly scope the credentials that are provisioned to those that are required to operate basic resources.
Last updated