Improper Access Control (National Health Insurance Fund in Lithuania)
The following vulnerability was reported to the National Cyber Security Centre (“NKSC”) and patched within days.
Access control is a security process that controls usage of specific resources within a predefined criteria.
“National Health Insurance Fund under the Ministry of Health” also known as “VLK” in Lithuania is an institution that manages a lot of health related data well obviously.
They have a web-application through which you can view your medical records and do some basic tasks, none of which are in the scope of this post.
Deploying without testing
You might assume that a governmental organization that manages a lot personal data (for every single citizen in the Republic of Lithuania)
would actually test the web-application before deploying it to production?
Well I thought the same, until I saw it myself (and it did not even require a lot of digging).
Discovery of the vulnerability
1. Finding interesting endpoints
By browsing throughout the UI we can observe all of the endpoints.
There were 2 interesting endpoints provided by SAP HANA which is a in-memory database.
2. Doing some research
We can find a SAP HANA Search Developer Guide on the Internet.
The following method returns the meta-data for all views that the user is allowed to access.
3. Trying out luck
If we try out the
$metadata call we can find some interesting information.
By following the specification and meta-data we can find how to use this API and try to get some user data.
There is no point in looking deeper it is obvious that we have an issue right here.
4. Responsibly disclosing the vulnerability to the authorities and waiting for response
- 2021-03-01 - Sent out a GPG encrypted email with the details to the authorities;
- 2021-03-01 - Received some feedback;
- 2021-03-02 - Web-application was taken down;
- 2021-03-03 - Vulnerability was fixed and web-application restored;