Bitmoji source code is accessible

Disclosed: 2021-07-31 00:20:32 By rms To snapchat
Medium
Vulnerability Details
hi team, I'm starting my research on snapchat by scanning all sub-domains on all the domains in-scope: snapchat.com, bitmoji.com, etc. Let's look at one of the urls, [https://rendering-service.prod.us-east.bitstrips.com/](https://rendering-service.prod.us-east.bitstrips.com/) When I request `GET https://rendering-service.prod.us-east.bitstrips.com/` The response is `403 Forbidden` After searching, I've found [/WEB-INF/](https://rendering-service.prod.us-east.bitstrips.com/WEB-INF/) & [/META-INF/](https://rendering-service.prod.us-east.bitstrips.com/META-INF/) directories, which are accessibles and allow directory listing. Inside `/WEB-INF/` we have all the .class files of bitmoji, we can download all the files. Then by using a java decompiler such as `procyon-decompiler` we reverse the .class files to make those readable. best, hermès. ## Impact Source code leaked
Actions
View on HackerOne
Report Stats
  • Report ID: 301812
  • State: Closed
  • Substate: resolved
  • Upvotes: 85
Share this report