Loading HuntDB...

Wordpress Users Disclosure (/wp-json/wp/v2/users/) on data.gov

Medium
G
GSA Bounty
Submitted None
Reported by nagli

Vulnerability Details

Technical details and impact analysis

Information Disclosure
## Summary: Hello TTS Bug bounty team! I have found data.gov User/admin usernames disclosed. Using REST API, we can see all the WordPress users/author with some of their information. ## Steps To Reproduce: You can find the information disclosure by going to (data.gov/wp-json/wp/v2/users/) Supporting Video: {F922807} Response: ```javascript [{"id":600633,"name":"Aaron Borden","url":"","description":"","link":"https:\/\/www.data.gov\/author\/aaron-bordengsa-gov\/","slug":"aaron-bordengsa-gov","avatar_urls":etc.... ``` ## Fix: Use this code will hide the users list and give 404 as the result, while rest of the api calls keep running as they were. ```javascript add_filter( 'rest_endpoints', function( $endpoints ){ if ( isset( $endpoints['/wp/v2/users'] ) ) { unset( $endpoints['/wp/v2/users'] ); } if ( isset( $endpoints['/wp/v2/users/(?P<id>[\d]+)'] ) ) { unset( $endpoints['/wp/v2/users/(?P<id>[\d]+)'] ); } return $endpoints; }); ``` ## Similar reports: (https://hackerone.com/reports/356047) (https://hackerone.com/reports/370777) (https://hackerone.com/reports/772744) Thank you very much. ## Impact Malicious counterpart could collect the usernames disclosed (and the admin user) and be focused throughout BF attack (as the usernames are now known), making it less harder to penetrate the data.gov systems.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Information Disclosure