FirstBlood-#151 — Event attendees leaked
This report has been reviewed and accepted as a valid vulnerability on FirstBlood!
On 2021-05-10, 0xn00b reported:
Event attendees are leaked by injecting custom header found on sitesettings.php when querying the
Steps to reproduce:
- Go to /hackerback.html.
- In the page source there is a JS script calling
- Try accessing this endpoint and you will get a blank page.
- Go to
- There is a custom header that is mentioned in that file
- try accessing
/drpanel/drapi/sitesettings.php this time intercept the request in burp.
- Add the custom header and forward the request.
EDIT: I revisited the Bug again and I was able to access PII by querying the
This report has been publicly disclosed for everyone to view
FirstBlood ID: 13
Vulnerability Type: Info leak
/attendees/event can be seen on the HackerBack.html page but has a blank response. Upon further inspection and from making use of the web app, you will notice you can add certain headers in order to interact with this endpoint. An old event ID leaks PII information about attendees.
Respect Earnt: 1500000
is an experimental cryptocurrency based on the Ethereum blockchain with the mission to show respect to those who deserve it. We are testing it out on our FirstBlood hackevent.