Full path disclosure at ads.twitter.com

Disclosed: 2014-11-17 14:30:50 By internetwache To x
Unknown
Vulnerability Details
Hi there, I noticed a small information disclosure (full path disclosure) on ads.twitter.com. #Steps to reproduce - 1. Login to ads.twitter.com - 2. Start to create a new twitter-follower campaign - 3. Choose to upload a new picture - 4. Turn on your intercepting proxy - 5. Upload a file - 6. You should notice a request to your log facility. ``` GET /accounts/18ce53wparq/log?v=0.9&u=https%3A%2F%2Fads.twitter.com%2Faccounts%2Fxxxx%2Fcampaigns%2Fnew_objective%2Ffollowers%3Fsource%3Dobjective_picker&rt.start=cookie&r=https%3A%2F%2Fads.twitter.com%2Faccounts%2Fxxxxx%2Fcampaigns%2Fnew&timers=&events=ads%3Afollowers%3Acreative%3A%3A%3Aenter HTTP/1.1 Host: ads.twitter.com User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:32.0) Gecko/20100101 Firefox/32.0 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://ads.twitter.com/accounts/xxxxx/campaigns/new_objective/followers?source=objective_picker Cookie: [COOKIES] Connection: keep-alive ``` The response will contain something like this: ``` x-sendfile: /var/lib/mesos/slaves/201403042312-2230002186-5050-50082-705/frameworks/201104070004-0000002563-0000/executors/thermos-1409696851527-revenue_web-prod-ads-36-d76baad3-5634-4141-ab52-478be9ecab97/runs/e09cc5ea-77f8-4729-afd1-0045b2a772c5/sandbox/app/assets/images/blank.gif ``` As you can see, this discloses a full path to a resource. This information could be used in furhter attack scenarios like LFI or RCE. Please let me know what you think about it. Best regards, Sebastian
Actions
View on HackerOne
Report Stats
  • Report ID: 26825
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report