Skip to content

Instantly share code, notes, and snippets.

@jubobs
Last active February 18, 2019 23:36
Show Gist options
  • Select an option

  • Save jubobs/53483c23a897238bac9e5b4bef5d3576 to your computer and use it in GitHub Desktop.

Select an option

Save jubobs/53483c23a897238bac9e5b4bef5d3576 to your computer and use it in GitHub Desktop.

Revisions

  1. jubobs revised this gist Feb 18, 2019. 1 changed file with 3 additions and 1 deletion.
    4 changes: 3 additions & 1 deletion teamwork-2019-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -4,7 +4,9 @@ Researcher name: Julien Cretel

    Researcher email: [email protected]

    Date: 18/01/2019
    Report date: 18/01/2019

    Status: fixed (18/01/2019)

    ## Vulnerability

  2. jubobs revised this gist Jan 25, 2019. No changes.
  3. jubobs revised this gist Jan 25, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2019-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -4,7 +4,7 @@ Researcher name: Julien Cretel

    Researcher email: [email protected]

    Date: 18/01/2018
    Date: 18/01/2019

    ## Vulnerability

  4. jubobs renamed this gist Jan 25, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2018-01-18a.md → teamwork-2019-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -1,4 +1,4 @@
    Report ID: teamwork-2018-01-18a
    Report ID: teamwork-2019-01-18a

    Researcher name: Julien Cretel

  5. jubobs revised this gist Jan 20, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -19,7 +19,7 @@ phishing attacks against (possibly high-value) Teamwork users in order to
    * steal their Teamwork credentials;
    * install malware on their machines.

    ## Attack scenario: stealing Teamwork credentials
    ## Example attack scenario: stealing Teamwork credentials

    1. The attacker designs a malicious website to look like the Teamwork Projects login page,
    and serves it at `https://attacker-controlled-site.com`.
  6. jubobs revised this gist Jan 18, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -38,7 +38,7 @@ phishing attacks against (possibly high-value) Teamwork users in order to

    ## Mitigation

    [OWASP's cheat sheet dedicated to this type of vulnerability][OWASP-unvalidated] provides some guidance.
    [OWASP's cheat sheet dedicated to this type of vulnerability][OWASP-cheat-sheet] provides some guidance.

    ## Resources

  7. jubobs revised this gist Jan 18, 2019. 1 changed file with 8 additions and 2 deletions.
    10 changes: 8 additions & 2 deletions teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -38,8 +38,14 @@ phishing attacks against (possibly high-value) Teamwork users in order to

    ## Mitigation

    [OWASP's page dedicated to this type of vulnerability][OWASP-unvalidated] provides some guidance.
    [OWASP's cheat sheet dedicated to this type of vulnerability][OWASP-unvalidated] provides some guidance.

    ## Resources

    * [Unvalidated Redirects and Forwards Cheat Sheet (OWASP)][OWASP-cheat-sheet]
    * [Top 10 2013-A10-Unvalidated Redirects and Forwards][OWASP-open-redirect]
    * [Video of proof-of-concept attack][poc-video]

    [OWASP-unvalidated]: https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet
    [OWASP-cheat-sheet]: https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet
    [OWASP-open-redirect]: https://www.owasp.org/index.php/Top_10_2013-A10-Unvalidated_Redirects_and_Forwards
    [poc-video]: https://www.youtube.com/watch?v=_NXHXn3PccE
  8. jubobs revised this gist Jan 18, 2019. 1 changed file with 3 additions and 3 deletions.
    6 changes: 3 additions & 3 deletions teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -21,10 +21,10 @@ phishing attacks against (possibly high-value) Teamwork users in order to

    ## Attack scenario: stealing Teamwork credentials

    1. The attacker designs a malicious website designed to look like the Teamwork Projects login page, and serves it at
    `https://attacker-controlled-site.com`.
    1. The attacker designs a malicious website to look like the Teamwork Projects login page,
    and serves it at `https://attacker-controlled-site.com`.
    Note: the attacker may use a domain name more similar to `teamwork.com` (e.g. `tearnwork.com`).
    2.. The attacker performs some reconnaissance on Teamwork users and acquires some high-impact targets.
    2. The attacker performs some reconnaissance on Teamwork users and acquires some high-impact targets.
    Some "misfeatures" of the Teamwork Web app make this relatively easy (more details about this available on demand).
    3. The attacker shares the following crafted URL `https://www.teamwork.com/welcome?code=https://attacker-controlled-site.com`
    with the victim, either by email or from within one of the Teamwork products.
  9. jubobs revised this gist Jan 18, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -16,7 +16,7 @@ where the value of query parameter `code` doesn't seem to be validated in any wa

    This vulnerability can be exploited by attackers to mount
    phishing attacks against (possibly high-value) Teamwork users in order to
    * steal their Teamwork credentials.
    * steal their Teamwork credentials;
    * install malware on their machines.

    ## Attack scenario: stealing Teamwork credentials
  10. jubobs revised this gist Jan 18, 2019. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -8,7 +8,7 @@ Date: 18/01/2018

    ## Vulnerability

    I've found an [*open-redirect vulnerability*][OWASP-open-redirect] on teamwork.com.
    I've found an [*open-redirect vulnerability*][OWASP-open-redirect] on https://www.teamwork.com.
    The endpoint of interest is `https://www.teamwork.com/welcome`,
    where the value of query parameter `code` doesn't seem to be validated in any way.

  11. jubobs revised this gist Jan 18, 2019. 1 changed file with 3 additions and 0 deletions.
    3 changes: 3 additions & 0 deletions teamwork-2018-01-18a.md
    Original file line number Diff line number Diff line change
    @@ -1,6 +1,9 @@
    Report ID: teamwork-2018-01-18a

    Researcher name: Julien Cretel

    Researcher email: [email protected]

    Date: 18/01/2018

    ## Vulnerability
  12. jubobs renamed this gist Jan 18, 2019. 1 changed file with 0 additions and 0 deletions.
    File renamed without changes.
  13. jubobs created this gist Jan 18, 2019.
    42 changes: 42 additions & 0 deletions gistfile1.txt
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,42 @@
    Report ID: teamwork-2018-01-18a
    Researcher name: Julien Cretel
    Researcher email: [email protected]
    Date: 18/01/2018

    ## Vulnerability

    I've found an [*open-redirect vulnerability*][OWASP-open-redirect] on teamwork.com.
    The endpoint of interest is `https://www.teamwork.com/welcome`,
    where the value of query parameter `code` doesn't seem to be validated in any way.

    ## Risks & threats

    This vulnerability can be exploited by attackers to mount
    phishing attacks against (possibly high-value) Teamwork users in order to
    * steal their Teamwork credentials.
    * install malware on their machines.

    ## Attack scenario: stealing Teamwork credentials

    1. The attacker designs a malicious website designed to look like the Teamwork Projects login page, and serves it at
    `https://attacker-controlled-site.com`.
    Note: the attacker may use a domain name more similar to `teamwork.com` (e.g. `tearnwork.com`).
    2.. The attacker performs some reconnaissance on Teamwork users and acquires some high-impact targets.
    Some "misfeatures" of the Teamwork Web app make this relatively easy (more details about this available on demand).
    3. The attacker shares the following crafted URL `https://www.teamwork.com/welcome?code=https://attacker-controlled-site.com`
    with the victim, either by email or from within one of the Teamwork products.
    Note: the attacker may hex-encode the query parameter in order to obfuscate it.
    4. The victim follows the link.
    5. The victim clicks the _Go to Projects_ button, and immediately gets redirected to
    `https://attacker-controlled-site.com`, which looks like the Teamwork login form.
    6. The victim fills the login form and submits it, thereby handing over her Teamwork credentials to the attacker.

    [This (unlisted) video][poc-video] illustrates such an attack.

    ## Mitigation

    [OWASP's page dedicated to this type of vulnerability][OWASP-unvalidated] provides some guidance.

    [OWASP-unvalidated]: https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet
    [OWASP-open-redirect]: https://www.owasp.org/index.php/Top_10_2013-A10-Unvalidated_Redirects_and_Forwards
    [poc-video]: https://www.youtube.com/watch?v=_NXHXn3PccE