Identify unique user ID of all the profiles
Medium
Vulnerability Details
Through this vulnerability, one can know the unencrypted user ID of all the profiles
Steps to reproduce:
1. Login to your Bumble profile
2. In the SERVER_GET_USER_LIST API replace the folder ID 0 with 7. This folder contains all the profiles in your deck /which you have right-swiped on (screenshot 1); Through this, we may choose to again swipe left on them if desired.
3. Intercept the response. The unique user ID of the profile is shown in plain text.
4. Adding additional parameters to the projection field also gives us information like the user vote, etc.
5. We can even increase the 'count' to get details of more profiles
## Impact
In case of a match, this information can be used by a male's profile to craft a message and initiate the chat, as the 'is_match' field is true and the 'user_id' field is now available. (Screenshot 2)
Actions
View on HackerOneReport Stats
- Report ID: 1005020
- State: Closed
- Substate: resolved
- Upvotes: 20