Loading HuntDB...

Path paths and file disclosure vulnerabilities at influxdb.quality.gitlab.net

Low
G
GitLab
Submitted None
Reported by otoyyy_h1

Vulnerability Details

Technical details and impact analysis

Information Disclosure
> NOTE! Thanks for submitting a report! Please note that initial triage is handled by HackerOne staff. They are identified with a `HackerOne triage` badge and will escalate to the GitLab team any. Please replace *all* the (parenthesized) sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report! ### Summary Path paths and file disclosure vulnerabilities at influxdb.quality.gitlab.net Hi, I discovered a file disclosure vulnerability within the influxdb.quality.gitlab.net domain This allows attackers to only get arbitrary files from remote servers. Where the file stack trace can be viewed without authentication. A heap file is an unordered set of records, stored on a set of pages. This class provides basic support for inserting, selecting, updating, and deleting records. Temporary heap files are used for external sorting and in other relational operators. A sequential scan of a heap file (via the Scan class) is the most basic access method. ### Steps to reproduce Vulnerability endpoint: ``` 1. https://influxdb.quality.gitlab.net/debug/pprof 2. https://influxdb.quality.gitlab.net/debug/pprof/goroutine?debug=1 3. https://influxdb.quality.gitlab.net/debug/pprof/heap 4. https://influxdb.quality.gitlab.net/debug/pprof/trace 5. https://influxdb.quality.gitlab.net/metrics/ 6. https://influxdb.quality.gitlab.net/stats.json ``` ## Impact allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files. In some cases, an attacker might be able to write to arbitrary files on the server, allowing them to modify application data or behavior, and ultimately take full control of the server.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure