Client ID and Client Secret Disclosure

XMLWordPrintable

    • Type: Task
    • Resolution: Unresolved
    • Priority: Medium
    • 3.8.0
    • Affects Version/s: None
    • FLW Sprint 37, FLW Sprint 38, FLW Sprint 39, FLW Sprint 40
    • FLW Mobile App
    • All

      Hardcoded client ID and client secret found in the application binary.

      Impact:
      Leads to full API/authorization compromise.

       

      Vulnerability Name Vulnerable URL CVE/CWE CVSS Score Overall Risk
      (Severity)
      Observation / Description Impact Recommendation Reference Steps to reproduce
      https://dev.abdm.gov.in/api/hiecm/gateway/v3/sessions Client ID and Client Secret Disclosure CWE-200 3.4 Low it was identified that the application exposes sensitive OAuth credentials, specifically the Client ID and Client Secret, within client-side components. These values were visible in the network requests and/or embedded within the application’s source code when inspected using developer tools or proxy tools like Burp Suite. Unauthorized API Access: Attackers can use the exposed Client ID and Client Secret to generate valid tokens or perform authenticated API calls.
      Account Takeover (Indirect Risk): If combined with other vulnerabilities, attackers may impersonate legitimate users.
      Abuse of Backend Services: Malicious actors can consume APIs, cause financial loss, or exhaust rate limits.
      Data Theft: Sensitive user or system data may be accessed using the leaked credentials.
      Full OAuth Compromise: The confidentiality and integrity of the entire authentication/authorization flow can be compromised.
      Move Client Secret to Server-Side:
      The Client Secret must be stored only on the server and never exposed to client-side code.
      Use Backend Authentication Flow:
      Implement proper OAuth flow (e.g., Authorization Code Flow with PKCE) to prevent secrets from being exposed.
      Regenerate Exposed Credentials:
      Immediately revoke and regenerate the compromised Client ID and Client Secret.
      Secure Communication:
      Ensure all sensitive authentication operations occur over HTTPS with strict validation.
      Code Review and Hardening:
      Remove all secrets from client-side assets and configuration files.
      Implement API Gateway or Token Proxy:
      Route sensitive authentication requests through a backend service to avoid exposing secrets.
      https://cwe.mitre.org/data/definitions/200.html Step 1: During the security assessment, we used the application and monitored the network requests through Burp Suite.
      Step 2: While analyzing the API requests and responses, we observed that sensitive authentication parameters were being transmitted in plain text.
      Step 3: Specifically, the Client ID and Client Secret were exposed within the API request/response payloads

              Assignee:
              Nikhil Ananda Fegade
              Reporter:
              Shashank Kharkwal
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: