Report ID
#29977
Report type
Websites and Applications
Has PoC?
Yes
Target
https://app.bean.money
Impacts
- Ability to execute arbitrary system commands
Description
Title: Critical Vulnerability - Remote Code Execution (RCE) on Bean Money Platform
VRT: VRT-2024-003
CVSS: 9.8 (Critical)
Description: A critical vulnerability allowing remote code execution (RCE) has been identified on the Bean Money platform accessible via the URLÂ https://app.bean.money. This vulnerability arises from inadequate input validation and sanitization, enabling malicious actors to execute arbitrary code on the server-side.
Impact: The impact of this vulnerability is severe, as it grants attackers the ability to execute arbitrary code on the server hosting the Bean Money platform. This could lead to complete compromise of the system, including unauthorized access to sensitive data, manipulation of financial transactions, and even full control over the Bean Money platform itself.
Proof of Concept:
- Craft a malicious payload containing executable code, such as a Python reverse shell.
- Send a request to the vulnerable endpoint, passing the crafted payload as a parameter, e.g.,Â
https://app.bean.money/vulnerable_endpoint?param=<malicious_payload>. - Upon processing the request, the server fails to properly sanitize the input, leading to the execution of the malicious code on the server-side.
- The attacker gains remote access to the server, allowing them to perform arbitrary actions, exfiltrate data, or escalate their privileges.
Recommended Fix:
- Immediately patch the vulnerability by implementing strict input validation and sanitization measures on all user-supplied data.
- Conduct a comprehensive security audit of the entire Bean Money platform to identify and remediate any similar vulnerabilities.
- Enhance security awareness and training among developers to prevent similar vulnerabilities in future code changes.
Impact Explanation: The critical nature of this vulnerability lies in its potential to allow attackers to execute arbitrary code on the server-side, leading to complete compromise of the Bean Money platform. With remote code execution capabilities, attackers can manipulate financial data, steal sensitive information, and disrupt the platform's operations. It is imperative to address this vulnerability immediately to prevent catastrophic consequences and safeguard the integrity of the Bean Money platform.
Proof of concept
Proof of Concept**:
- Craft a malicious payload containing executable code, such as a Python reverse shell.
- Send a request to the vulnerable endpoint, passing the crafted payload as a parameter, e.g.,Â
https://app.bean.money/vulnerable_endpoint?param=<malicious_payload>. - Upon processing the request, the server fails to properly sanitize the input, leading to the execution of the malicious code on the server-side.
- The attacker gains remote access to the server, allowing them to perform arbitrary actions, exfiltrate data, or escalate their privileges.