Skip to main content

Playing With Chatbots πŸ€–

Crashing Chat Bot System

⭐Contents

➡️Missing Rate Limiting
➡️Unrestricted File Upload
➡️Reflected and Blind cross site scripting
➡️Application level Dos
--------------------------------------------------------------------

πŸ‘‰ Rate Limiting in Chat Bots

🌟 Description:-

Chat Bots are used for interaction between people and services to enhance customer experience.And an user can send messages.When the message endpoint has no rate limit protection then we can send unlimited messages which can leads to denial of service attack.

🌟 Exploitation:-

❇ Send a Message to chatbot and intercept that request into burpsuite
❇ Now Send This Request To Intruder And Repeat It multiple more than 200+ Time By Fixing Any Arbitrary Payload Which Doesn't No Effect Request I Choose Accept-Language: en-US,en;q=0.$5$
❇ Ater some time you will get 500 status code
❇ Now try to send a message to that CHAT bot with another account and you wont get any reply since CHAT bot system is crashed

🌟 Impact:-

Business Impact and DOS because the user wont get reponse from the company which can decrease the interaction between people and services and when chat bots crashed some bot servcies Costs to replace you bot or fix the issuse as result Financial Lose

🌟 Reference:-

https://bugreader.com/ahmad_halabi@crashing-chat-bot-system-215

πŸ‘‰ Unrestricted File Upload

🌟 Description:-

Here the attacker can able to upload any file format like .exe,.php,e.t.c in chatbot

🌟 Exploitation:-

❇ upload asp file using .cer & .asa extension
❇Upload .eml file when content-type = text/HTML
❇ Check for .svg file upload you can achieve stored XSS using XML payload
❇ upload PHP file using .pht extension when web app validates for the extension. (Apache-Linux)

🌟 Impact:-

we can achive remote code execution with the file upload vulnerability by uploading php shell and also we can achieve XSS, LFI , XXE ,Phising, paramter pollution ,SQL injection , it may disclose sensitive info and internal paths and etc

🌟 Reference:-

https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
https://hackerone.com/reports/826288
https://hackerone.com/reports/925513
https://bugdisclose.medium.com/art-of-unrestricted-file-upload-exploitation-92ed28796d0

πŸ‘‰ Reflected and Blind Cross Site Scripting in Chat

🌟 Description:-

Here the attacker can able perform both reflected and blind xss

🌟 Exploitation:-

❇ for reflected xss we can craft payloads based upon filters
❇ for blindxss when we start chat they will ask about our details in input parameters use xsshunter you will get mail when it triggers

🌟 Impact:-

An attacker is able to access critical information from the support team. The XSS reveals the administrator’s IP address, backend application service, titles of mail chimp customer and internal subscription emails, support team session cookies.

🌟 Reference:-

https://hackerone.com/reports/73566
https://hackerone.com/reports/81757
https://hackerone.com/reports/1010466

πŸ‘‰ Application level Dos

🌟 Description:-

By Sending Low and high end(based upon the file limit they mentioned) resolution image in chats bots leads to Dos attack

🌟 Exploitation:-

❇ Create a two accounts(Normal and attacker account)
❇ Now upload a low pixel size image in chat bot as attacker and on the same time upload a normal image from the second account as normal user
❇ Now both the attacker and victim will get 502 response

🌟 Impact:-

Here Due to Low Pixel Images uploaded by attacker cause 502 response and other users are not able to upload images to the support team

🌟 Reference:-

https://hackerone.com/reports/970760

Comments

Post a Comment

Popular posts from this blog