Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Phabricator: Conduit feed.publish API allows you to spoof other users or make it look like you have access to a restricted object

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Phabricator: Conduit feed.publish API allows you to spoof other users or make it look like you have access to a restricted object


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
The Conduit feed.publish API allows a user to publish stories to the feed. The API accepts a parameter "type" which will be set to PhabricatorTokenGivenFeedStory and accepts JSON in the "data" parameter such as the following: { "authorPHID": "PHID-USER-uyg3nn764yetx6nglnbx", "tokenPHID": "PHID-TOKN-medal-4", "objectPHID": "PHID-TASK-lg22pqfkf4iuqbmx35k4" } This data can be manipulated in order to spoof other users, this is done by replacing the "authorPHID" value with the user that the attacker wishes to spoof. We can additionally manipulate the "objectPHID" to any PHID of any other object, if the object is restricted, it will look like the attacker has access to the relevant object and was thus able to award the object with a token (though the attacker does not have access to the object and the story only shows for users with access to the object). The user PHID can easily be gotten from the relevant user's page. The attacker can get the object PHID of a restricted object from the HTML of a page if the restricted object is attached in some form to the page (e.g., a restricted task as a subtask of a viewable task). I'm not exactly sure what the purpose of this API is, but it should at least be restricted in some form (e.g, only callable by bots or administrators). An attacker can also simply spam the feed with lots of stories, or cause the feed to error if given bad data (such as an empty list), in which case the relevant row will need to be deleted from the... ...



๐Ÿ“Œ Phabricator: Conduit feed.publish API allows you to spoof other users or make it look like you have access to a restricted object


๐Ÿ“ˆ 196.6 Punkte

๐Ÿ“Œ HackerOne: Improper data update process on UpdatePhabricatorIntegration mutation leads to leak of Phabricator Conduit API token.


๐Ÿ“ˆ 61.28 Punkte

๐Ÿ“Œ Phabricator: Deprecated owners.query API bypasses object view policy


๐Ÿ“ˆ 39.76 Punkte

๐Ÿ“Œ ELI5 what made GitLab the more popular choice compared to other GitHub alternatives, like Phabricator, Launchpad, Savanah, etc.?


๐Ÿ“ˆ 39.63 Punkte

๐Ÿ“Œ Phabricator: IDOR bug to See hidden slowvote of any user even when you dont have access right


๐Ÿ“ˆ 37.98 Punkte

๐Ÿ“Œ New Zoom Screen-Sharing Bug Lets Other Users Access Restricted Apps


๐Ÿ“ˆ 35.79 Punkte

๐Ÿ“Œ New Zoom Screen-Sharing Bug Lets Other Users Access Restricted Apps


๐Ÿ“ˆ 35.79 Punkte

๐Ÿ“Œ ThreatList: Game of Thrones, a Top Malware Conduit for Cybercriminals


๐Ÿ“ˆ 30.8 Punkte

๐Ÿ“Œ CVE-2021-4249 | xml-conduit up to 1.9.0.0 DOCTYPE Entity Expansion Parse.hs infinite loop (ID 161)


๐Ÿ“ˆ 30.8 Punkte

๐Ÿ“Œ Apex Legends: Ignite introduces a new Legend named Conduit and cross-progression for all platforms


๐Ÿ“ˆ 30.8 Punkte

๐Ÿ“Œ In A Year Like No Other, What Did Yours Look Like? Take The Survey.


๐Ÿ“ˆ 30.76 Punkte

๐Ÿ“Œ Want to Make Fedora (or any other distro) look like Ubuntu?


๐Ÿ“ˆ 30.53 Punkte

๐Ÿ“Œ TIBCO FTP Community Edition up to 6.5.0 on Windows Server/C API/Golang API/Java API/.Net API access control


๐Ÿ“ˆ 29.69 Punkte

๐Ÿ“Œ CVE-2022-48367 | eZ Publish Ibexa Kernel prior 7.5.28 Object State access control (GHSA-5x4f-7xgq-r42x)


๐Ÿ“ˆ 29.32 Punkte

๐Ÿ“Œ I want to make Linux look exactly like MacOS. (like red Star os) Reasons given below


๐Ÿ“ˆ 29.3 Punkte

๐Ÿ“Œ Sudo? More like Su-doh: There's a fun bug that gives restricted sudoers root access (if your config is non-standard)


๐Ÿ“ˆ 29.28 Punkte

๐Ÿ“Œ 5 vulnerabilities in Samba. One critical flaw CVE-2022-32744 allows Active Directory users to change passwords of other users


๐Ÿ“ˆ 28.84 Punkte

๐Ÿ“Œ Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes


๐Ÿ“ˆ 28.84 Punkte

๐Ÿ“Œ CVE-2022-44108 | pdftojson 94204bb Object.cc Object::copy(Object*) stack-based overflow


๐Ÿ“ˆ 27.84 Punkte

๐Ÿ“Œ Look at this text I have received twice. Should I be scared? I blocked it but how does a random email like that have my number?


๐Ÿ“ˆ 27.48 Punkte

๐Ÿ“Œ MWatcher - Publish New Posts from RSS Feed


๐Ÿ“ˆ 27.47 Punkte

๐Ÿ“Œ Phishers Spoof USPS, 12 Other Natlโ€™ Postal Services


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Contributing to KDE is easier than you think โ€“ Phabricator patches using the web interface


๐Ÿ“ˆ 27.1 Punkte

๐Ÿ“Œ How to Access Restricted Folder in Windows : Access Denied Error


๐Ÿ“ˆ 27.05 Punkte

๐Ÿ“Œ VMware API Allows Limited vSphere Users to Access Guest OS


๐Ÿ“ˆ 26.32 Punkte











matomo