Quantcast
Channel: Bountied questions - Information Security Stack Exchange
Viewing all articles
Browse latest Browse all 154

Accessing user data by a public 'token' - is it a potential vunabilility?

$
0
0

I joined a small project, I noticed that in the project uses something like a token associated with a user journey. So the URL looks something like: https://host.com/sell/:jurneyID.

All data entered during by the user in the journey are associated with the jurneyID including email, personal information and so on.

That means when I go to https://host.com/success/:jurneyID I can see user data related to that journey.

There is no concept of a session which means that anyone who knows jurneyID can access this data.

In theory jurneyID is long randomly unique string and expires after two weeks, however, I still don't like this solution because:

  • token string can be brute-forced
  • jurneyID is part of the URL therefore can be extracted from logs, browser history, etc.

I'd like to ask if you know any resources which can prove that this solution is a bad idea, and does such vulnerability has its name?


Viewing all articles
Browse latest Browse all 154

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>