Loading HuntDB...

credentials leakage in public lead to view dev websites

Low
Z
Zomato
Submitted None
Reported by xsam

Vulnerability Details

Technical details and impact analysis

Information Disclosure
**Description:** Hello Zomato team :) So after I found a new OSINT website ████ which fetch results from Pastebin website, I searched for "zdev.net" and I got this interesting result ██████████ {F443315} I logged in https://gazal.zdev.net/test.php after I decoded Base64 Authorisation ``` ███ ``` {F443316} I tried to pass the parameters in POST request to see if the website handle it or not but I didn't get any result, the next step was to brute-force directories, I used a simple wordlist but I didn't get any results, then I found that https://gagandeep.zdev.net is also protected with the same basic access authentication credentials. for that reason, I contacted Prateek privately to check with him about this point. ## Impact There is no big impact to my knowledge, but since there is kind of credentials leakage and authentication bypass I decided to report it.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure