Loading HuntDB...

Information Disclosure when /invitations/<token>.json is not yet accepted

Medium
H
HackerOne
Submitted None
Reported by japz

Vulnerability Details

Technical details and impact analysis

Information Disclosure
Hi Team, **Summary:** First, i just want to clarify that this finding seems a purely human mistake from one of the hackerone member team who created a summary of this report: #283309 --- I have found that you guys (HackerOne) was disclosing email address and private program as part of this report summary of previously disclosed report: https://hackerone.com/reports/283309 __Summary screenshot below:__ ███████ You will observed that HackerOne team create a summary of the report, but the summary discloses the token of the report PoC of the researcher: https://hackerone.com/invitations/█████████.json , but since the token is still valid (means invitation note yet accepted) it discloses the email address of the researcher and the private program. ## PoC (Steps to reproduce) 1. Load the invitation token that hackerone mentioned on the summary: https://hackerone.com/invitations/█████.json 2. Response `{"token":"█████","type":"Invitations::ReportDraft","auth_option":"use-existing-account","email":"████","status":"never","expires_at":null,"team":{"name":"████","handle":"██████","state":"soft_launched","profile_picture":"https://profile-photos.hackerone-user-content.com/production/000/009/583/█████.png?1456279218","url":"https://hackerone.com/██████████"}}` __Researcher email address:__ ███ __Private program handle name:__ █████████ █████ ## Mitigation: First, immediately remove the token on the summary, second it is good to not display the email address of the researcher on the json response. Let me know if anything else is needed. Regards Japz

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure