Confidential data of users and limited metadata of programs and reports accessible via GraphQL
Critical
Vulnerability Details
**Summary:**
The GraphQL endpoint doesn't have access controls implemented properly.
**Description:**
Any attacker can get personally identifiable information of users of Hackerone such as email address, backup hash codes, facebook_user_id, account_recovery_phone_number_verified_at, totp_enabled, etc.
These are just some examples of fields which are getting leaked directly from GraphQL.
This is the request sent to GraphQL:
```
{
id
users()
{
total_count
nodes
{
_id
name
username
email
account_recovery_phone_number
account_recovery_unverified_phone_number
bounties
{
total_amount
}
otp_backup_codes
i_can_update_username
location
year_in_review_published_at
anc_triager
blacklisted_from_hacker_publish
calendar_token
vpn_credentials
{
name
}
account_recovery_phone_number_sent_at
account_recovery_phone_number_verified_at
swag
{
total_count
}
totp_enabled
subscribed_for_team_messages
subscribed_for_monthly_digest
sessions
{
total_count
}
facebook_user_id
unconfirmed_email
}
}
```
Sample Response:
█████████
Please fix it.
Thanks,
Yash :)
## Impact
This could potentially leak many users' info
Actions
View on HackerOneReport Stats
- Report ID: 489146
- State: Closed
- Substate: resolved
- Upvotes: 998