Single API Key from a Chrome Extension Led to 5.2 Million Exposed Customer Records
作者在探索Chrome扩展时发现某咖啡连锁品牌扩展程序存在IDOR漏洞和不安全API接口,导致敏感凭证暴露。该问题违反了Google政策,在报告后扩展被下架。此案例也反映了Google逐步淘汰Chrome应用的趋势。 2025-8-9 05:35:27 Author: infosecwriteups.com(查看原文) 阅读量:66 收藏

Erkan Kavas

Story of an IDOR with insecure API but responsible disclosure that saved millions of users data. (Lovely 5k$)

During one of my routine explorations of public Chrome extensions, I stumbled upon a chain-owned extension belonging to a popular Asian coffee delivery platform. The extension, designed for quick order access, included preconfigured API endpoints and a hardcoded authorization key.

Press enter or click to view image in full size

secret coffee chain in asia. @ spoonuniversity . com

Most developers assume Chrome extensions are harmless. But once installed, they’re just ZIP archives — any resource, including JavaScript and config files, is easily accessible.

According to Google’s Chrome Web Store Developer Program Policies, extensions must not expose sensitive credentials or grant unauthorized access to user data. This incident clearly violated those rules, and the extension was voluntarily taken down within days of the report.

Cases like this may also highlight why Google has been moving away from Chrome Apps entirely — the end of support for Chrome Apps has been gradually rolling out, with full deprecation planned across all platforms. You can read more about that in Google’s official announcement. 🥹


文章来源: https://infosecwriteups.com/single-api-key-from-a-chrome-extension-led-to-5-2-million-exposed-customer-records-0cc81545a7a8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh