Seemingly sensitive information at /api/v2/zones

Disclosed: 2016-11-16 19:59:26 By sameoldstory To instacart
Unknown
Vulnerability Details
Overview == https://www.instacart.com/api/v2/zones is accessible by a regular Instacart user and seems to return sensitive information such as names, emails, phone numbers, money amounts and dates. ``` GET /api/v2/zones { "meta": { "code": 200 }, "data": { "zones": [ ... { "id": 73, "name": "████", "created_at": "2014-10-01T01:36:07.302Z", "updated_at": "2016-06-14T23:32:39.147Z", ... "active": true, "supervisor_phone": "███████", ... "hourly_guarantee_amount_cents": █████████, "hourly_guarantee_amount_currency": "USD", "guarantee_ends_at": "2015-12-31T00:00:00.000Z", ... "applicant_supervisor_name": "█████", "applicant_supervisor_phone": "████", ... "applicant_supervisor_email": "██████", "use_phone_screening": false, ... "strict_shopper_probation": true, "picking_only_hourly_guarantee_amount_cents": █████████, ... ``` Security Implications == It's hard for me to evaluate how sensitive the information is, but it definitely doesn't look like something you would put up on the website for everyone to see. I guess a competitor company could make good use of it. Also an attacker could use the information to plan social engineering attacks.
Actions
View on HackerOne
Report Stats
  • Report ID: 165131
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report