How I Found an Exposed User Database via an Unprotected API (And How to Prevent It) in a private…
一位安全研究人员通过ffuf工具发现了一个未受保护的Django REST API端点api.example.com/user/,该端点暴露了超过150个用户记录,包括哈希密码、电子邮件和角色信息。此漏洞可能被攻击者利用。 2025-9-10 06:4:26 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Be nice insabat

Assalam o alaikum for muslim brothers, sisters and hello for non muslims, i hope all of you are doing well and learning new things day by day.

i am back with another intresting finding story for increasing my following and for sharing my journey so without wasting any time lets start the main story

FREE LINK https://medium.com/@InsbatArshad/how-i-found-an-exposed-user-database-via-an-unprotected-api-and-how-to-prevent-it-in-a-private-77dd95a1101c?sk=a46bb029e1d56ceac6aac98a70c20b8c

The Discovery: An Open Door to Sensitive Data

During a routine security assessment, Using ffuf I encountered an unauthenticated Django REST API endpoint at api.example.com/user/. To my surprise, it returned:

json { “count”: 150, “results”: [ { “email”: “[email protected]”, “password”: “pbkdf2_sha256$…”, “role”: “superuser” }, … ] }

Over 150 user records — including hashed passwords, emails, and roles — were publicly accessible. This wasn’t just a misconfiguration; it was a goldmine for attackers.

Command i used is

ffuf -u https://exampe.target.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -mc 200,302

FFUF is a powerfull tool and dont forget to test every subdomain with this, sometimes it is boring and time…


文章来源: https://infosecwriteups.com/how-i-found-an-exposed-user-database-via-an-unprotected-api-and-how-to-prevent-it-in-a-private-77dd95a1101c?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh