Loading HuntDB...

Able to view hackerone reports attachments

Critical
G
GitLab
Submitted None

Team Summary

Official summary from GitLab

The reporter found a way to get access to all attachments imported from HackerOne reports with our automation. This included proofs of concept for unpatched vulnerabilities and was rewarded as a critical severity finding given the possibility of leaking unpatched critical severity vulnerabilities. Note that it is intended that https://gitlab.com/gitlab-org/gitlab/-/issues?label_name%5B%5D=HackerOne still shows many fixed vulnerabilities as well as unfixed issues that were deemed low severity enough to be made public. You can learn more about this in the `Disclosure` section of our bug bounty program's policy.

Reported by sateeshn

Vulnerability Details

Technical details and impact analysis

Insecure Storage of Sensitive Information
### Summary (Hi team, I accidentally found this bug. While reading one of hackerone public report (https://hackerone.com/reports/446238) about gitlab, I found a link posted by gitlab member which is related to internal tracking of the report. I clicked that link (https://gitlab.com/gitlab-org/gitlab-foss/-/issues/54220) and found one of the attachment. I am able to view all the attachments by directly visiting the attachment domain.) ### Steps to reproduce 1. Open https://h1.sec.gitlab.net/a/ (you will able to view all the attachments) and copy any content key 2. Paste key infront of https://h1.sec.gitlab.net/a/ (ex: https://h1.sec.gitlab.net/a/copied_key.jpg) (you will able to view attachment) To view nonpublic hackerone report attachment, find the hackerone report key from the above link > copy and paste infront of https://h1.sec.gitlab.net/a/ Try to view this hackerone report you will see access denied https://hackerone.com/reports/446237 but still you can able to view the report attachment by visiting https://h1.sec.gitlab.net/a/█████ ## Impact As attachments consist of researcher attached POC images and videos. So attacker can directly exploit by using these information.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insecure Storage of Sensitive Information