Loading HuntDB...

Sourcemaps and Unminified Source Code Exposed on Pages

Medium
I
Imgur
Submitted None
Reported by gennaro

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
Hello, I'm not sure if this was actually meant to be made public on purpose, but I was looking through some of the sources that were loaded and found out the following: * https://imgur.com/ - See ██████ * s.imgur.com -> desktop-assets -> js * contains multiple minified JS files as one would usually expect. In the following pages(But not limited too), we see: * https://imgur.com/upload * https://imgur.com/account/settings/* * https://{username}.imgur.com/all * https://imgur.com/account/messages * s.imgur.com -> include -> js * As we can see on the following pages this contains a "minified" folder and then all the uniminified corresponding source code files. * See █████████ ## Impact Assuming the unminified source files were not intentionally left exposed to the public: * Loss of internal confidentiality * Source code can be stolen * Internal documentation exposed to the public can create a target to dev environments that are traditionally not meant to be publicly facing * e.g. ███████ shows a link to: ████████████/████████ * a simple scan I was able to find what seems to be multiple dev builds of the site and access to the git login, VPN login, etc: ██████████.███████/ Though these are not direct exploits to systems, it does create un-needed attention to additional points of entry to source code repos, internal documentation, and potentially other company confidential information. I hope this was helpful!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic