domingo, 15 de marzo de 2026
la inteligenttsia.
Technical Vulnerability Report: Multiple Critical Misconfigurations & Information Disclosure
1. Executive Summary
During a security assessment of the Bolt CMS Prelive environment, several critical vulnerabilities were identified. By bypassing the WAF/Cloudflare layer and interacting directly with the origin server (52.28.81.208), I gained access to sensitive system diagnostics (phpinfo.php), internal network architecture, and absolute file system paths. Furthermore, the application is susceptible to User Enumeration, allowing an attacker to map valid corporate identities.
2. Vulnerability Details
A. Critical Information Disclosure via phpinfo.php
Severity: Critical (CVSS: 9.1)
Description: The origin server exposes a full PHP diagnostic page. This leaks environment variables, loaded modules, and server configurations.
Impact: Disclosure of internal IP addresses (+++++++++++++), AWS Trace IDs, and the absolute document root (/var/www/nexsysonev3/).
B. Origin Server IP Discovery (WAF Bypass)
Severity: High
Description: The backend server at +++++++++++ accepts direct HTTPS connections using the Host: cms.prelive.bolt.eu header.
Impact: This renders Cloudflare/WAF protections useless, as an attacker can launch payloads (SQLi, Bruteforce) directly against the origin without rate limiting or filtering.
C. User Enumeration via Fingerprint API
Severity: Medium/High
Description: The endpoint /login/fingerprintregister returns distinct error messages (User ID or email is not found) when an invalid identity is provided.
Impact: Attackers can perform automated "Credential Stuffing" or user mapping to identify valid Bolt employee accounts.
D. Insecure File Extension Policy
Severity: Medium
Description: The global.js configuration explicitly allows the upload/handling of dangerous extensions including .sql, .db, .log, and .kml.
Impact: Combined with the known path /var/www/nexsysonev3/, this increases the risk of Arbitrary File Access if backup files are stored in reachable directories.
3. Steps to Reproduce
Direct Origin Access:
Execute a request to the origin IP bypassing DNS:
curl -k -I -H "Host: +++++++++++++++" https://+++++++++++++++/nexsysonev3/
Access Diagnostics:
Navigate to https://++++++++/++++++++/phpinfo.php to view full system environment.
Perform Enumeration:
Send a POST request to the registration endpoint:
curl -X POST -d "userid=admin&email=test@bolt.eu" https://52.28.81.208/nexsysonev3/login/fingerprintregister
Observe the JSON response confirming if the user exists.
4. Impact Assessment
An attacker can use the disclosed internal paths and network IPs to plan a lateral movement attack within Bolt's AWS infrastructure. The exposure of the Development environment with live backend configurations poses a significant risk of a full database breach or unauthorized administrative access.
5. Recommendations
Immediate: Remove phpinfo.php and any other diagnostic scripts from the production and prelive environments.
WAF Hardening: Configure the origin security groups (AWS SG) to only accept traffic from Cloudflare's IP ranges.
API Security: Sanitize API responses to return generic error messages (e.g., "Invalid credentials or request") to prevent user enumeration.
System Hardening: Disable directory listing and restrict access to sensitive file extensions (.sql, .log, .env) via Apache .htaccess or virtual host configuration.
Would you like me to add a specific "Proof of Concept" (PoC) section with the screenshots or logs we gathered during the session?
Suscribirse a:
Enviar comentarios (Atom)
-
Si lees este capítulo suelto te puedes - reir - si no fuera por la cacho novela que hay detrás, entonces el que me - río ...
-
Cömo francotirador a veces disparo y ya sabés cuál es mi - ave - favorita. Por desgracia - la izquierda - cuando yo era joven nos per...
No hay comentarios:
Publicar un comentario