Files
nuclei-templates/http/misconfiguration/google/insecure-firebase-database.yaml
2023-10-20 11:41:16 +00:00

46 lines
1.2 KiB
YAML

id: insecure-firebase-database
info:
name: Insecure Firebase Database
author: rafaelwdornelas
severity: high
description: If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase database.
reference:
- https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty
metadata:
verified: true
max-request: 2
tags: firebase,google,misconfig,intrusive
http:
- raw:
- |
PUT /{{randstr}}.json HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"id":"insecure-firebase-database"}
- |
GET /{{randstr}}.json HTTP/1.1
Host: {{Hostname}}
req-condition: true
matchers-condition: and
matchers:
- type: word
part: body_2
words:
- '{"id":"insecure-firebase-database"}'
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a00473045022021c3430eb08001deac0eb146df5123a5f469cff8c9ac6b5306503a5f9bc7c703022100cd7f96d493b9afa576c74c42cde7d76f740e5457d4d79f2727e4026e2955dedc:922c64590222798bb761d5b6d8e72950