Confidential data of users and limited metadata of programs and reports accessible via GraphQL

Disclosed: 2019-02-03 10:57:19 By yashrs To security
Critical
Vulnerability Details
**Summary:** The GraphQL endpoint doesn't have access controls implemented properly. **Description:** Any attacker can get personally identifiable information of users of Hackerone such as email address, backup hash codes, facebook_user_id, account_recovery_phone_number_verified_at, totp_enabled, etc. These are just some examples of fields which are getting leaked directly from GraphQL. This is the request sent to GraphQL: ``` { id users() { total_count nodes { _id name username email account_recovery_phone_number account_recovery_unverified_phone_number bounties { total_amount } otp_backup_codes i_can_update_username location year_in_review_published_at anc_triager blacklisted_from_hacker_publish calendar_token vpn_credentials { name } account_recovery_phone_number_sent_at account_recovery_phone_number_verified_at swag { total_count } totp_enabled subscribed_for_team_messages subscribed_for_monthly_digest sessions { total_count } facebook_user_id unconfirmed_email } } ``` Sample Response: █████████ Please fix it. Thanks, Yash :) ## Impact This could potentially leak many users' info
Actions
View on HackerOne
Report Stats
  • Report ID: 489146
  • State: Closed
  • Substate: resolved
  • Upvotes: 998
Share this report