<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Api-Disclosure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/api-disclosure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/api-disclosure/feed.xml" rel="self" type="application/rss+xml"/><item><title>AVideo API Secret Disclosure Leads to Unauthorized Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-avideo-api-disclosure/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-avideo-api-disclosure/</guid><description>AVideo version 29.0 and earlier is vulnerable to unauthenticated API secret disclosure via a publicly accessible endpoint, allowing unauthorized access to protected API endpoints.</description><content:encoded><![CDATA[<p>AVideo, a video-sharing platform, is vulnerable to a critical security flaw that allows unauthenticated users to access sensitive API secrets. Specifically, the <code>objects/plugins.json.php</code> endpoint, intended to provide plugin configuration details, inadvertently exposes the <code>APISecret</code> within the <code>object_data</code>. This vulnerability, present in versions 29.0 and earlier, allows an attacker to bypass authentication and directly interact with protected API endpoints. By extracting the <code>APISecret</code>, an attacker can then craft API requests to access restricted data, such as user lists, without proper authorization. This poses a significant risk to data confidentiality and integrity within AVideo installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker discovers the publicly accessible <code>objects/plugins.json.php</code> endpoint.</li>
<li>The attacker sends an HTTP GET request to <code>objects/plugins.json.php</code> to retrieve plugin configurations.</li>
<li>The server responds with a JSON payload containing plugin <code>object_data</code>, including the <code>APISecret</code>.</li>
<li>The attacker extracts the <code>APISecret</code> from the JSON response.</li>
<li>The attacker crafts a malicious API request to the <code>plugin/API/get.json.php</code> endpoint, including the <code>APISecret</code> as an authentication token.</li>
<li>The attacker specifies the desired <code>APIName</code> (e.g., <code>users_list</code>) and other parameters (e.g., <code>rowCount</code>, <code>current</code>) in the API request.</li>
<li>The server incorrectly validates the request based on the provided <code>APISecret</code>.</li>
<li>The server responds with the requested data, granting the attacker unauthorized access to protected information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthorized access to sensitive data managed by the AVideo platform. An attacker could potentially access user lists and other restricted information. The number of affected installations is currently unknown, but any instance running AVideo version 29.0 or earlier is susceptible. This can lead to data breaches, privacy violations, and potential misuse of user information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the recommended fix of requiring admin authentication for the full plugin inventory/config endpoint (as suggested in the advisory).</li>
<li>Deploy the Sigma rule &ldquo;AVideo API Secret Disclosure Attempt&rdquo; to detect attempts to access the vulnerable <code>objects/plugins.json.php</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;AVideo Unauthorized API Access via APISecret&rdquo; to detect unauthorized API calls using a disclosed API secret.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>avideo</category><category>api-disclosure</category><category>unauthorized-access</category></item></channel></rss>