IDOR at https://fast.trychameleon.com/observe/v2/profiles/ via uid parameter discloses users' PII data
Medium
L
Lab45
Submitted None
Actions:
Reported by
cankat
Vulnerability Details
Technical details and impact analysis
## Summary:
Hello,
A API on apps.topcoder.com/forums/ exposes the email of any user on topcoder.com and some PIIs (name, surname, id).
## Steps To Reproduce:
1) Create a profile at topcoder.com
2) Go to apps.topcoder.com/forums and login forum
3) Entery any topic (example: https://apps.topcoder.com/forums/?module=Thread&threadID=966515&start=0)
4) Open Intercept and click "Watch Thread" button
5) Catch the request and send to repeater, it will look like this:
F1147918
(This request comes from fast.trychameleon.com, but fast.trychameleon.com is not the cause of the security vulnerability.)
6) Let's go into the profile of any user on topcoder.com. (this is my other user and target user: https://www.topcoder.com/members/nomadex41)
7) Press F12 and search(CTRL-F) "userID"
F1147928
8) Copy the "userID" value and replace it with the "uid" part in the HTTP request.
9) Also give a random value to the title of the request ( POST /observe/v2/profiles/randomvalue HTTP/1.1) and sumbit.
poC: F1147950
Leaked all topcoder users email, name, surname and profile_id information.
This is not public visible to other users.
This vulnerability is not caused by fast.trychameleon.com, because the userID values are open in the topcoder.
Best Regards.
## Impact
Leaked all topcoder users email
PIIs leak
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Disclosure