GNU/Weeb Mailing List <[email protected]>
 help / color / mirror / Atom feed
From: Alviro Iskandar Setiawan <[email protected]>
To: Ammar Faizi <[email protected]>
Cc: Michael William Jonathan <[email protected]>,
	"GNU/Weeb Mailing List" <[email protected]>
Subject: Re: CF ticketing system is still vulnerable
Date: Sun, 23 Apr 2023 05:58:09 +0700	[thread overview]
Message-ID: <CAOG64qMi=1oM+iEKZmoQQWonDzE1ZBkfA5pCNmF2LQYQcK8KRw@mail.gmail.com> (raw)
In-Reply-To: <CAOG64qO-G66HPBBmsDs80fgfCQrN2o1oSZ720i2TJSMn67cgpw@mail.gmail.com>

On Sat, Apr 22, 2023 at 1:02 PM Alviro Iskandar Setiawan wrote:
> On Sat, Apr 22, 2023 at 9:35 AM Ammar Faizi wrote:
> > They just said they have fixed the vuln. Please verify that it's
> > actually fixed, then you can sleep well.
>
> Looks good to me. Now the endpoint returns {"success":false}.

Back to this again, I am not sure if the fix is proper. I get HTTP 500
when accessing it from libcurl in my C program:

> * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
> * Using Stream ID: 1 (easy handle 0x7f19f0000b70)
> > GET /<URI> HTTP/2
> > Host: kiostix.com
> > user-agent: curl/7.81.0
> > accept: */*
>
> * Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
> < HTTP/2 500
> < content-type: application/json; charset=utf-8
> < content-length: 17
> < date: Sat, 22 Apr 2023 22:45:27 GMT
> < access-control-allow-credentials: true
> < access-control-allow-origin: *
> < access-control-allow-methods: GET,OPTIONS,PATCH,DELETE,POST,PUT
> < access-control-allow-headers: X-CSRF-Token, X-Requested-With, Accept, Accept-Version, Content-Length, Content-MD5, Content-Type, Date, X-Api-Version
> < etag: "zngjl94gbkh"
> < vary: Accept-Encoding
> < x-cache: Error from cloudfront
> < via: 1.1 6f91c725c3d4f2326304347075e516a4.cloudfront.net (CloudFront)
> < x-amz-cf-pop: SIN2-P1
> < x-amz-cf-id: _2tJGxIIYax9O0HQ6DexdXe1EYH_u8_Ow1d5Z6N2G9mGSRU2RRGkKw==
> <
> * Connection #0 to host kiostix.com left intact
> {"success":false}

But if I access it from curl cmd:

> * TLSv1.2 (OUT), TLS header, Supplemental data (23):
> > GET /<URI> HTTP/2
> > Host: kiostix.com
> > user-agent: curl/7.81.0
> > accept: */*
> >
> * TLSv1.2 (IN), TLS header, Supplemental data (23):
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> * TLSv1.2 (IN), TLS header, Supplemental data (23):
> * Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
> * TLSv1.2 (OUT), TLS header, Supplemental data (23):
> * TLSv1.2 (IN), TLS header, Supplemental data (23):
> < HTTP/2 200
> < content-type: application/json; charset=utf-8
> < content-length: 167
> < date: Thu, 20 Apr 2023 23:12:21 GMT
> < access-control-allow-credentials: true
> < access-control-allow-origin: *
> < access-control-allow-methods: GET,OPTIONS,PATCH,DELETE,POST,PUT
> < access-control-allow-headers: X-CSRF-Token, X-Requested-With, Accept, Accept-Version, Content-Length, Content-MD5, Content-Type, Date, X-Api-Version
> < etag: "d65958y5yu4n"
> < vary: Accept-Encoding
> < x-cache: RefreshHit from cloudfront
> < via: 1.1 8d08de7fce6cdb6f648bade508fa2926.cloudfront.net (CloudFront)
> < x-amz-cf-pop: SIN2-P1
> < x-amz-cf-id: 3CtjmR6LPdqP4wVerazXS7DVYSVaPdEYQ609h-Uczw9UgjeQ6W-BFw==
> < age: 171251
> <
> * TLSv1.2 (IN), TLS header, Supplemental data (23):
> * Connection #0 to host kiostix.com left intact
> {"success":true,"etickets":["https://eticket.kiostix.com/e/6bfbaea6-d318-4c11-89d0-9637fec4a0d2","https://eticket.kiostix.com/e/18b368dd-e486-4f6f-9492-f471a526dc84"]}

That means it's not fixed. Also, HTTP 500 indicates internal server
error. It seems something goes very wrong with their fix attempt. So
yes, it's still vulnerable when I write this email.

-- Viro

  parent reply	other threads:[~2023-04-22 22:58 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <CAOG64qN7ZPE+twkvxWM8uq4NDsWzbUsXGYvrPxhf55YWG2G3Ww@mail.gmail.com>
2023-04-21  0:45 ` CF ticketing system is still vulnerable Ammar Faizi
2023-04-21 23:21   ` Ammar Faizi
2023-04-21 23:41     ` Alviro Iskandar Setiawan
2023-04-21 23:50       ` Ammar Faizi
2023-04-22  0:09         ` Alviro Iskandar Setiawan
2023-04-22  0:18           ` Ammar Faizi
2023-04-22  0:29             ` Alviro Iskandar Setiawan
2023-04-22  0:41               ` Ammar Faizi
2023-04-22  0:54                 ` Alviro Iskandar Setiawan
2023-04-22  1:01                   ` Ammar Faizi
2023-04-22  2:35                     ` Ammar Faizi
2023-04-22  6:02                       ` Alviro Iskandar Setiawan
2023-04-22  6:38                         ` Ammar Faizi
2023-04-22  6:53                           ` Alviro Iskandar Setiawan
2023-04-22  7:49                             ` Telegram bot? (was: Re: CF ticketing system is still vulnerable) Ammar Faizi
2023-04-22  7:52                               ` Alviro Iskandar Setiawan
2023-04-22  7:59                                 ` Ammar Faizi
2023-04-22  8:00                                   ` Alviro Iskandar Setiawan
2023-04-22 22:58                         ` Alviro Iskandar Setiawan [this message]
2023-04-22 23:06                           ` CF ticketing system is still vulnerable Ammar Faizi
2023-04-22 23:11                             ` Alviro Iskandar Setiawan
2023-04-22 23:23                               ` Alviro Iskandar Setiawan
2023-04-22 23:36                                 ` Ammar Faizi
2023-04-23  1:28                                   ` Alviro Iskandar Setiawan
2023-04-23  1:31                                     ` Alviro Iskandar Setiawan
2023-04-23  1:38                                       ` Ammar Faizi
2023-04-23  1:47                                         ` Alviro Iskandar Setiawan
2023-04-23  1:53                                           ` Ammar Faizi
2023-04-23  3:33                                             ` Alviro Iskandar Setiawan
2023-04-23  3:36                                               ` Ammar Faizi
2023-04-23  3:48                                                 ` Moe
2023-04-23  3:56                                                   ` Ammar Faizi
2023-04-23  5:23                                                     ` Alviro Iskandar Setiawan
2023-04-23  5:28                                                       ` Ammar Faizi
2023-04-23  5:43                                                         ` Alviro Iskandar Setiawan
2023-04-23  5:35                                                   ` Ammar Faizi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAOG64qMi=1oM+iEKZmoQQWonDzE1ZBkfA5pCNmF2LQYQcK8KRw@mail.gmail.com' \
    [email protected] \
    [email protected] \
    [email protected] \
    [email protected] \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox