“Day 7: API Hacking — How I Stole 5000 OAuth Tokens & Won $300”
作者通过测试一款金融科技应用发现其Firebase数据库因API配置错误而暴露OAuth令牌、银行账户链接及交易记录等敏感信息,并详细介绍了利用Burp Suite和cURL工具进行漏洞验证的过程及技术细节。 2025-8-20 19:54:41 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Aman Sharma

Last month, while testing a “secure” fintech app, I discovered an unprotected Firebase database leaking OAuth tokens, bank account links, and transaction histories — all because of one misconfigured API endpoint. The company paid me $300 after I demonstrated how an attacker could drain thousands of accounts. Here’s the full technical breakdown, with actual cURL commands and Python scripts I used.

free link

“If you don’t get a ‘403 Forbidden’, you’re probably onto something.”

Most API breaches happen due to:

  • Missing access controls (No auth checks)
  • Excessive data exposure (Returning entire user objects)
  • Debug endpoints left open (like /api/v1/test/admin)

Step 1: Intercepted Mobile App Traffic

  • Used Burp Suite to proxy the app’s requests
  • Found a call to:
GET https://fintech-app.firebaseio.com/users.json?auth=null  

Step 2: Tested for Public Access


文章来源: https://infosecwriteups.com/day-7-api-hacking-how-i-stole-5000-oauth-tokens-won-300-49b988ed8e21?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh