Disclosure of all uploads to Cloudinary via hardcoded api secret in Android app

Disclosed: 2018-09-08 14:51:22 By bagipro To reverb
Medium
Vulnerability Details
Hi, in file ``` com/reverb/app/CloudinaryFacade.java ``` you have hardcoded the following config: ```java private static final java.lang.String CONFIG = "cloudinary://434762629765715:█████@reverb"; ``` where ``` 434762629765715:████████ ``` is basic auth details. It shouldn't be disclosed to third parties as official docs say (https://github.com/cloudinary/cloudinary_android): > Note: You should only include the ``` cloud_name ``` in the value, the api secret and key should be left out of the application. I was able to access your account data {F297519} {F297520} Those keys give me ability to not only access the files, but also replace and delete them, change different their settings. Also this url https://api.cloudinary.com/v1_1/reverb/usage discloses statistics regarding stored files ```json "requests":1894689201, "resources":36029794, "derived_resources":256178843 ``` ## Impact Disclosure of all uploads to Cloudinary via hardcoded api secret in Android app
Actions
View on HackerOne
Report Stats
  • Report ID: 351555
  • State: Closed
  • Substate: resolved
  • Upvotes: 86
Share this report