Seemingly sensitive information at /api/v2/zones
Unknown
Vulnerability Details
Overview
==
https://www.instacart.com/api/v2/zones is accessible by a regular Instacart user and seems to return sensitive information such as names, emails, phone numbers, money amounts and dates.
```
GET /api/v2/zones
{
"meta": {
"code": 200
},
"data": {
"zones": [
...
{
"id": 73,
"name": "████",
"created_at": "2014-10-01T01:36:07.302Z",
"updated_at": "2016-06-14T23:32:39.147Z",
...
"active": true,
"supervisor_phone": "███████",
...
"hourly_guarantee_amount_cents": █████████,
"hourly_guarantee_amount_currency": "USD",
"guarantee_ends_at": "2015-12-31T00:00:00.000Z",
...
"applicant_supervisor_name": "█████",
"applicant_supervisor_phone": "████",
...
"applicant_supervisor_email": "██████",
"use_phone_screening": false,
...
"strict_shopper_probation": true,
"picking_only_hourly_guarantee_amount_cents": █████████,
...
```
Security Implications
==
It's hard for me to evaluate how sensitive the information is, but it definitely doesn't look like something you would put up on the website for everyone to see. I guess a competitor company could make good use of it. Also an attacker could use the information to plan social engineering attacks.
Actions
View on HackerOneReport Stats
- Report ID: 165131
- State: Closed
- Substate: resolved
- Upvotes: 4