Dangerous RTLO Injection

Disclosed by
nt3c's avatar
nt3c
  • Engagement Asana
  • Disclosed date almost 3 years ago
  • Priority P5 Bugcrowd's VRT priority rating
  • Status Informational This vulnerability is seen as an accepted business risk
Summary by nt3c

It was possible to perform RTLO Injection (Right To Left Override Injection). This technique takes advantage of \u202E, a non-printing Unicode character that causes the text that follows it to be displayed in reverse it is commonly used to disguise a string and/or file name and/or url to make it appear benign and to bypass security defences.

Report details
  • Submitted

  • Target Location

    Asana Android app
  • Target category

    Android

  • VRT

    Server-Side Injection > Content Spoofing > Right-to-Left Override (RTLO)
  • Priority

    P5
  • Bug URL
    Empty
  • Description

    -->CWE (Common Weakness Enumeration):
    CWE-451: User Interface Misrepresentation of Critical Information
    CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

    -->CVSS Score: 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

    -->Observations/Impact:
    It was possible to perform RTLO Injection (Right To Left Override Injection). This technique takes advantage of \u202E, a non-printing Unicode character that causes the text that follows it to be displayed in reverse it is commonly used to disguise a string and/or file name and/or url to make it appear benign and to bypass security defences.
    The Android application fails to sanitize user input executing the RTLO character and parsing it as a url.
    This is a very dangerous behavior which may have serious consequences.

    -->POC:
    Check the attached POC video.

    -->Resources:
    https://attack.mitre.org/techniques/T1036/002/
    https://nvd.nist.gov/vuln/detail/CVE-2020-20093
    https://nvd.nist.gov/vuln/detail/CVE-2020-20094
    https://nvd.nist.gov/vuln/detail/CVE-2020-20095
    https://nvd.nist.gov/vuln/detail/CVE-2020-20096
    https://nvd.nist.gov/vuln/detail/CVE-2022-28345

    -->Notes:
    Attending to issue simplicity of execution, criticality and possible consequences, comparing it to all current know CVEs, as listed above, the VRT Category should be reevaluated and classified at least as P3.

Activity
  1. jakestebbins’s avatar
    jakestebbins Customer published the disclosure report

    ()

  2. nt3c’s avatar
    nt3c requested disclosure

    ()

  3. nt3c’s avatar
    nt3c sent a message

    ()Edited

  4. nt3c’s avatar
    nt3c sent a message

    ()

  5. soheesec_bugcrowd’s avatarbugcrowd logo
    soheesec_bugcrowd changed the state to Informational

    ()

  6. soheesec_bugcrowd’s avatarbugcrowd logo
    soheesec_bugcrowd sent a message

    ()

  7. nt3c’s avatar
    nt3c sent a message

    ()

  8. nt3c’s avatar
    nt3c created the submission

    ()