You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The "uid" parameter can be populated with data exposed in the previous request. This means that an attacker could access all questions belonging to other users and view the detailed account information of other users.
Broken Access Control vulnerabilities like this can pose a significant security risk, as they allow unauthorized access to sensitive data. It's important to address and fix this issue promptly to protect user privacy and data security.
The text was updated successfully, but these errors were encountered:
Thank you for raising the issue, almost all APIs are not use the proper session manager yet.
That's why it's still rely on the user parameter in many places.
I already prepared the better session management but maybe will take some times to rollout to the whole endpoint especially the private one.
I plan to do that for at least until the next week.
As an initial, I will remove the uid from the response, but of course it's not solving the root cause problems that impacting to all endpoints.
Hello, I've found a Broken Access Control vulnerability.
The API endpoint for user data, specifically:
https://www.tanyaaja.in/api/user/by-slug/[username]
This API URL is displaying user data, including their "uid."
I've also discovered another API endpoint:
https://www.tanyaaja.in/api/question/by-uid/[example]
The "uid" parameter can be populated with data exposed in the previous request. This means that an attacker could access all questions belonging to other users and view the detailed account information of other users.
Broken Access Control vulnerabilities like this can pose a significant security risk, as they allow unauthorized access to sensitive data. It's important to address and fix this issue promptly to protect user privacy and data security.
The text was updated successfully, but these errors were encountered: