GraphQL Query leads to sensitive information disclosure
Medium
G
GitLab
Submitted None
Actions:
Reported by
chroduath
Vulnerability Details
Technical details and impact analysis
> NOTE! Thanks for submitting a report! Please replace *all* the (parenthesized) sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!
### Summary
Graphql Query mentioned below disclosed emails of profiles which are not visible on their public pages in gitlab
### Steps to reproduce
1> Go to Gitlab Graphql Explorer (https://gitlab.com/-/graphql-explorer)
2> Use the query to fetch the information
{
users {
edges {
node {
username
email
avatarUrl
status {
emoji
message
messageHtml
}
}
}
}
}
3> Navigate through any of the public profile of the usernames fetched with url : https://gitlab.com/username
4> Email information is not displayed in the public profile while the graphql query fetches it
### Impact
This can be abused since email address is not publicly visible through gitlab profile. Any person can access user emails and try to hack their accounts using brute-force etc.
### What is the current *bug* behavior?
It displays sensitive information about the user which is not available in their public profile
### What is the expected *correct* behavior?
it should only display public profile information such as username but not email
### Relevant logs and/or screenshots
Screenshot attached
## Impact
This can be abused since email address is not publicly visible through gitlab profile. Any person can access user emails and try to hack their accounts using brute-force etc
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Privacy Violation