AccessControl.Bypass: MooTools Authorization Bypass For Hidden Element
mahantsucf opened this issue · 1 comments
Stratos Version
Stratos Version 4.4.0
Frontend Deployment type
- Cloud Foundry Application (cf push)
- [X ] Kubernetes, using a helm chart
- Docker, single container deploying all components
- npm run start
- Other (please specify below)
Backend (Jet Stream) Deployment type
- Cloud Foundry Application (cf push)
- Kubernetes, using a helm chart
- Docker, single container deploying all components
- Other (please specify below)
Expected behaviour
When we do an AppScan static scan, the scanning results shouldn’t yield any vulnerabilities.
Actual behaviour
We ran Appscan and these vulnerabilities were marked as Medium Severity issues.
Steps to reproduce the behavior
AppScan Go: version 0.1.7
Steps
Open Appscan go application
Checkout the code of Stratos : release 4.4.0 (https://github.com/cloudfoundry/stratos.git) in your local machine.
Choose the type of scan i.e. Complete Security Scan
Click on Browse button and browse to the src folder(except test-e2e folder) of the stratos project that you checkout in step 2.
AppScan Go! retrieves appropriate files from the selected folder and lists them for review. No need to change anything on this just click on Continue button.
Click on Create a new scan button ---> Initiate scan : This will initiate the scan process.
When upload to AppScan on Cloud is complete, click the link review the status or results of the scan in the AppScan on Cloud service(there are lots of high severity issue you will see).
Reference : https://help.hcltechsw.com/appscan/ASoC/src_irx_gen_gui.html
Log output covering before error and any error statements
![AppScan_Log](https://user-images.githubusercontent.com/81233158/127610474-7dbe22ca-96fe-453c-a0a6-c97508360c94.PNG)
Detailed Description
Exact Location where the issue occurs:
src\frontend\packages\kubernetes\src\kubernetes\kube-config-registration\kube-config-selection\kube-config-selectio
n.component.ts:151
src\frontend\packages\kubernetes\src\kubernetes\kubernetes-resource-viewer\kubernetes-resource-viewer.compone
nt.ts:255
src\frontend\packages\kubernetes\src\kubernetes\workloads\release\helm-release-tab-base\helm-release-socket-ser
vice.ts:198
src\frontend\packages\kubernetes\src\kubernetes\workloads\release\helm-release-tab-base\helm-release-tab-base.c
omponent.ts:75
src\frontend\packages\kubernetes\src\kubernetes\workloads\release\tabs\helm-release-summary-tab\helm-release-s
ummary-tab.component.ts:236
src\frontend\packages\core\src\features\endpoints\endpoints-page\endpoints-page.component.ts:120
src\frontend\packages\core\src\shared\services\side-panel.service.ts:112
src\frontend\packages\core\src\shared\services\side-panel.service.ts:141
src\frontend\packages\core\src\features\dashboard\dashboard-base\dashboard-base.component.ts:129
Context
Risk
Attackers can issue a request directly to a page or resource that they may not be authorized to access, allowing an attacker to gain
access to sensitive information, or possibly even corrupt resources and information.
Cause
The access policy to application functionality is not consistently enforced on every resource request, and access to resources is not
restricted to authorized users only.
Effectively the application grants more permissions than required, or conversely, does not correctly apply restrictions on what actions
the user can perform.
Possible Implementation
Ensure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access
any information that they are not authorized for by simply requesting direct access to that page.
Ensure that all pages that contains sensitive information or functionality, restrict access to requests that are accompanied by an active
and authenticated session token associated with a user who has the required permissions to access that page.
Only grant the privileges that are necessary for required business functionality, according to the principle of Least Privilege.
We found this is false positive issue , Hence closing.