Loading HuntDB...

Seemingly sensitive information at /api/v2/zones

I
Instacart
Submitted None
Reported by sameoldstory

Vulnerability Details

Technical details and impact analysis

Information Disclosure
Overview == https://www.instacart.com/api/v2/zones is accessible by a regular Instacart user and seems to return sensitive information such as names, emails, phone numbers, money amounts and dates. ``` GET /api/v2/zones { "meta": { "code": 200 }, "data": { "zones": [ ... { "id": 73, "name": "████", "created_at": "2014-10-01T01:36:07.302Z", "updated_at": "2016-06-14T23:32:39.147Z", ... "active": true, "supervisor_phone": "███████", ... "hourly_guarantee_amount_cents": █████████, "hourly_guarantee_amount_currency": "USD", "guarantee_ends_at": "2015-12-31T00:00:00.000Z", ... "applicant_supervisor_name": "█████", "applicant_supervisor_phone": "████", ... "applicant_supervisor_email": "██████", "use_phone_screening": false, ... "strict_shopper_probation": true, "picking_only_hourly_guarantee_amount_cents": █████████, ... ``` Security Implications == It's hard for me to evaluate how sensitive the information is, but it definitely doesn't look like something you would put up on the website for everyone to see. I guess a competitor company could make good use of it. Also an attacker could use the information to plan social engineering attacks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$50.00

Submitted

Weakness

Information Disclosure