Loading HuntDB...

Information Disclosure through Sentry Instance ███████

High
Z
Zomato
Submitted None
Reported by chajer

Vulnerability Details

Technical details and impact analysis

Information Exposure Through Debug Information
Hello team I found a bug (sensitive information ) can be used from attackers to perfom attack in youre server I don't know if this in scope so i'm sorry if i'm wrrong withou spending youre time here the steps how i found this bug : 1-Please use burp suite to reproduce the same result 2-i notice you have as tool for track errors (sentry) 3- i send the request to ███ via /api/20/store█████████ 4-change request from get to post Request: == POST /api/20/store██████ HTTP/1.1 Host: ███ Connection: close Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 ██████ Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 Sec-Fetch-Site: none Accept-Encoding: gzip, deflate Accept-Language: fr-FR,fr;q=0.9,en-US;q=0.8,en;q=0.7 Content-Type: application/x-www-form-urlencoded Content-Length: 0 5-go to response and click in the [Render ] to view disclosure UI 6- i get alot of information disclosure ███(see my screenns) i think the server behind this is [███] with ███ ## Impact Please see the screens for more information best regards let me know if you need more information.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$750.00

Submitted

Weakness

Information Exposure Through Debug Information