InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

PII Exposure: The Data Heist You Never Knew Was Possible!

--

Hey there, fellow security enthusiasts! Today, we’re going to talk about something that might blow your mind. How an SMTP conversation can accidentally lead to exposing PII. Yeah, that’s right! Many organizations rely on SMTP (Simple Mail Transfer Protocol) for their email communications, but sometimes they don’t realize how easily sensitive data can leak through these conversations, especially when it’s misconfigured.

I was hunting on a private program. I have done basic recon. And started checking one by one in scope domains and subdomains. There was signup functionality on the subdomain. I filled in mandatory details and tested signup functionalities. I was going through burp history. Then I found there was SMTP conversation in response when registration was successful. At the bottom of SMTP conversation there was a link of API, which sends an email and text message to the user after successful registration. They are using third-party API for sending emails and text messages on the contact number. That third-party API was using GET method.

SMTP conversation in response

That SMTP response revealed a third-party API key, which was revealing API key, username, message, sender’s name, and template ID. I simply copied that link and pasted it in the browser and — boom! You’ve got yourself a security risk. I received the same message a second time. I tried 4 times, and I received 4 text messages [financial loss]. I played with that API a few times. I was able to OTP or text, whatever I wanted to send, on any random number.

Remaining Balance

Then I went to that third-party website and sign up for an account. And read documentation. I found the wallet and report API. When I hit the report API, I was able to see usernames, passwords [generated password], full names, and contact numbers. I tried to log in with those creds, and I was able to log in successfully.

Date wise report

That’s all fellas, Stay safe and keep hacking (ethically, of course 😉)!!!

Instagram: th3.d1p4k

Twitter: Dipak Panchal

LinkedIn: Dipak Panchal

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by th3.d1p4k

Cybersecurity Enthusiast | Blogger | CAP (SecOps) | phpMyAdmin (CVE 2022-23808)

No responses yet

Write a response