Unauthenticated PII leak on verified/requested to be verified profiles on ███████/app/org/{id}/profile/{id}/version/{id} [HtUS]
Medium
Vulnerability Details
**Description:**
On any published profile page,you can switch between their profile's versions(provided they have made at least 1 change after publication) ,which will make a GET request to **███/organization/{id}/profile{id}/version/{id}**.
While proxying traffic through Burp Suite,another request is being sent to **████████*/app/org/*{id}/profile{id}/version/{id}** ,which exposes some information about the author such as **id,uuid and name**,BUT if you switch to the version that is **verified/requested to be verified**,the same endpoint(but with different version id) will return the above info **+ their email**,which adds to the PII disclosure.
Worst of all,this endpoint can be accessed even by unauthenticated users,and all steps above can be done unauthenticated aswell.
## References
██████████
## Impact
Any **unauthenticated** person can obtain PII information from any **verified** profile or profiles that have **requested verification**.
Actions
View on HackerOneReport Stats
- Report ID: 1627962
- State: Closed
- Substate: resolved
- Upvotes: 5