credentials leakage in public lead to view dev websites

Disclosed: 2019-03-18 06:49:52 By xsam To zomato
Low
Vulnerability Details
**Description:** Hello Zomato team :) So after I found a new OSINT website ████ which fetch results from Pastebin website, I searched for "zdev.net" and I got this interesting result ██████████ {F443315} I logged in https://gazal.zdev.net/test.php after I decoded Base64 Authorisation ``` ███ ``` {F443316} I tried to pass the parameters in POST request to see if the website handle it or not but I didn't get any result, the next step was to brute-force directories, I used a simple wordlist but I didn't get any results, then I found that https://gagandeep.zdev.net is also protected with the same basic access authentication credentials. for that reason, I contacted Prateek privately to check with him about this point. ## Impact There is no big impact to my knowledge, but since there is kind of credentials leakage and authentication bypass I decided to report it.
Actions
View on HackerOne
Report Stats
  • Report ID: 511440
  • State: Closed
  • Substate: resolved
  • Upvotes: 75
Share this report