π Ultimay Security Assessment
Client: Ultimay β Cloud-Based Marketing Agency Project Management Suite
Engagement: Web Application Security Assessment
Industry: SaaS β Project Management
π‘οΈ Overview
Ultimay, a cloud-based project management platform, engaged me to perform a gray box security assessment focusing on authentication, access controls, and infrastructure security. Using a Manager-level test account, I identified four critical vulnerabilities that posed significant security risks:
1οΈβ£ User Role IDOR β Privilege Escalation to Admin
2οΈβ£ User ID IDOR β Data Leak & Account Tampering
3οΈβ£ Remote Code Execution (RCE) via File Upload Logic Abuse
4οΈβ£ Stored Cross-Site Scripting (XSS) Across Multiple Modules
These findings exposed the platform to unauthorized access, account takeovers, remote code execution, and persistent client-side attacks.
π Findings & Key Issues
1οΈβ£ Use Role IDOR β Privilege Escalation to Admin
Severity: π΄ Critical
Issue: The platform used a hidden input field in the Edit Profile section that controlled user roles but lacked server-side validation.
Exploit: Attackers could modify their user role to admin-level privileges by simply altering the hidden role value in the request.
Impact: Full administrative access, allowing an attacker to manage users, data, and platform configurations.
Fix: Implemented strict Role-Based Access Control (RBAC) and enforced server-side validation to prevent unauthorized privilege changes.
2οΈβ£ User ID IDOR β Data Leak & Account Tampering
Severity: π΄ Critical
Issue: The User ID parameter in multiple account-related endpoints allowed unauthorized access to other usersβ data without authentication checks.
Exploit: Attackers could modify another user’s profile details, emails, passwords, and sensitive account settings simply by manipulating the User ID in API requests.
Impact: Mass account compromise, leading to data leaks, identity fraud, and platform-wide security failures.
Fix: Enforced server-side authorization checks to ensure users can only access and modify their own data.
3οΈβ£ Remote Code Execution (RCE) via File Upload Logic Abuse
Severity: π΄ Critical
Issue: The file upload feature accepted arbitrary file types, storing them locally before pushing them to AWS S3.
Exploit: Attackers could upload malicious PHP files, bypass upload restrictions, and execute commands on the server via the /uploads/temp/
directory.
Impact: Full remote shell access, enabling attackers to exfiltrate data, manipulate databases, and escalate system privileges.
Fixes:
β
Restricted file types to only allow approved formats.
β
Disabled execution permissions in upload directories (chmod -x
).
β
Moved temporary files to a non-public directory before processing.
4οΈβ£ Stored Cross-Site Scripting (XSS) Across Multiple Modules
Severity: π΄ Critical
Issue: Multiple input fields across 12+ modules failed to sanitize user inputs, leading to persistent JavaScript injection.
Exploit: Attackers could inject malicious scripts that executed when users viewed affected pages, enabling:
- Session hijacking (stealing authentication cookies).
- Phishing attacks (injecting fake login prompts).
- Data theft & account compromise (stealing form inputs).
Affected Modules: - Daily Reminders, Prospects, Customers, Proposals, Vendors, Projects, Files, Invoices, Billing, and more.
Remediation Process: - Initial Fix: Applied output encoding and input sanitization (
strip_tags
,htmlspecialchars
). - Long-Term Collaboration: Worked closely with Ultimayβs developers to validate fixes across all affected areas.
- Final Validation: Conducted follow-up testing to ensure full XSS mitigation.
π’ Outcome
β
Enforced secure role-based access controls (RBAC), preventing privilege escalation.
β
Eliminated user ID-based data leaks, securing account integrity.
β
Hardened infrastructure security, blocking RCE & unauthorized file executions.
β
Successfully mitigated stored XSS risks, ensuring long-term protection.
β
Validated all fixes post-remediation, securing Ultimayβs platform against future exploits.