Loading HuntDB...

Disclosure of all uploads to Cloudinary via hardcoded api secret in Android app

Medium
R
Reverb.com
Submitted None
Reported by bagipro

Vulnerability Details

Technical details and impact analysis

Hi, in file ``` com/reverb/app/CloudinaryFacade.java ``` you have hardcoded the following config: ```java private static final java.lang.String CONFIG = "cloudinary://434762629765715:█████@reverb"; ``` where ``` 434762629765715:████████ ``` is basic auth details. It shouldn't be disclosed to third parties as official docs say (https://github.com/cloudinary/cloudinary_android): > Note: You should only include the ``` cloud_name ``` in the value, the api secret and key should be left out of the application. I was able to access your account data {F297519} {F297520} Those keys give me ability to not only access the files, but also replace and delete them, change different their settings. Also this url https://api.cloudinary.com/v1_1/reverb/usage discloses statistics regarding stored files ```json "requests":1894689201, "resources":36029794, "derived_resources":256178843 ``` ## Impact Disclosure of all uploads to Cloudinary via hardcoded api secret in Android app

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted