InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

EXIF Geolocation Data: The Overlooked Risk in Uploaded Images

HackerNasr
InfoSec Write-ups
Published in
3 min readJan 16, 2025

Introduction: A Simple Bug with Hidden Risks

Some vulnerabilities don’t require advanced tools or complex techniques to exploit; just attention to detail. One such vulnerability is unstripped EXIF geolocation data in uploaded images.

This happens to be one of my favorite bugs to hunt for. Why? Because it doesn’t require much effort, yet it can expose sensitive data like a user’s exact location, device information, or timestamps. Surprisingly, this type of vulnerability is often overlooked by developers and bug hunters alike, making it a hidden gem in the bug bounty world.

In this article, we’ll explore how unstripped metadata in images can lead to security risks, how to detect it, and why it’s critical to sanitize uploaded files.

What Is EXIF data?

EXIF (Exchangeable Image File Format) data is embedded information(metadata) stored in image files, such as JPG, PNG, and TIFF. This data often includes:

  • Geolocation coordinates: GPS latitude and longitude.
  • Device details: Camera make, model, and settings.
  • Timestamps: When and where the image was captured.

If applications fail to strip this metadata during the upload process, sensitive data could be unintentionally exposed to malicious actors.

A Practical Demonstration: Unstripped Metadata

While testing for vulnerabilities, I encountered an image uploaded to a web application that hadn’t been sanitized properly. Upon analyzing the image using ExifTool, I discovered embedded geolocation metadata, which could expose sensitive information. Here’s the command I used to inspect the metadata:

Next, I inspected the metadata to verify the geolocation data was present:

exiftool index.jpg
image exif data

You have probably seen the metadata of an image before, but for those who haven’t, keep in mind that this is just a portion of the…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by HackerNasr

I share my passion for cybersecurity and networking, exchanging insights from real-world security research and learning together with others.

No responses yet

Write a response