Loading HuntDB...

[34.96.80.155] Server Logs Disclosure lead to Information Leakage

Low
E
Evernote
Submitted None
Reported by huntinex

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
## Summary: In this case server log is available for any in `/server-status` ## Steps To Reproduce: 1. Go to https://34.96.80.155/server-status/ and follow attack scenario's ### Attack Scenario's: **[Serg.io]** 1. User go to server and enter sensitive info that can be logged (example : `http://host/login?private_key=<KEY>`) 2. Attacker read the logs and founded sensitive information that user entered (example : `private_key=<KEY>`) {F1510839} **[translate.evernote.com]** In this site login and many features available and it's increase the impact 1. Users login with sso ( example : `/sso?sso_private_key=<key>&next=/ssoreturn` ) 2. Attacker can read full sso key and login (Account Take Over) ## Supporting Material/References: ### Why [34.96.80.155] blongs to www.evernote.com : * the ssl certificate : https://www.shodan.io/host/34.96.80.155 (SSL Cert related to *Evernote Corporation*) * copywrite section : > © 2014–2021 Evernote Corporation ## Impact attacker can read all log on server

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$150.00

Submitted

Weakness

Privilege Escalation