Information disclosure (system username) in the x-amz-meta-s3cmd-attrs response header on federation.data.gov
Low
G
GSA Bounty
Submitted None
Actions:
Reported by
sp1d3rs
Vulnerability Details
Technical details and impact analysis
##Description
Hi. I just noticed, that you are extended the scope for the bounty program. I looked to the first resource -
```
https://federation.data.gov/
```
I noticed, that the `x-amz-meta-s3cmd-attrs` response header returns sensitive information, like system username:
```
x-amz-meta-s3cmd-attrs:uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1482273904/atime:1482273904/md5:c9d60fd5a46044f7c58684a6c701ce54/ctime:1482273904
```
{F215241}
##Impact
The attacker can gain sensitive information about system username. In this case it was `root`, so i marked impact as `Low`. Still, the developers can have a good reason to not expose this information in the response header.
##Suggested fix
I found the related article, written by other researcher:
https://medium.com/@arbazhussain/username-disclose-at-s3-balsamiq-d98336d4012d
and issue in the s3cmd repository: https://github.com/s3tools/s3cmd/issues/67
where sugested fix is adding the `-- no-preserve` comand.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$150.00
Submitted
Weakness
Information Disclosure