Identify unique user ID of all the profiles
Medium
B
Bumble
Submitted None
Actions:
Reported by
covertlyovert
Vulnerability Details
Technical details and impact analysis
Through this vulnerability, one can know the unencrypted user ID of all the profiles
Steps to reproduce:
1. Login to your Bumble profile
2. In the SERVER_GET_USER_LIST API replace the folder ID 0 with 7. This folder contains all the profiles in your deck /which you have right-swiped on (screenshot 1); Through this, we may choose to again swipe left on them if desired.
3. Intercept the response. The unique user ID of the profile is shown in plain text.
4. Adding additional parameters to the projection field also gives us information like the user vote, etc.
5. We can even increase the 'count' to get details of more profiles
## Impact
In case of a match, this information can be used by a male's profile to craft a message and initiate the chat, as the 'is_match' field is true and the 'user_id' field is now available. (Screenshot 2)
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Insecure Direct Object Reference (IDOR)