Closed Bug 1446723 Opened 7 years ago Closed 7 years ago

https://keyserver.mozilla.org information disclose

Categories

(Websites :: Other, enhancement)

enhancement
Not set
normal

Tracking

(Not tracked)

RESOLVED INVALID

People

(Reporter: dipakprajapati803, Unassigned)

References

()

Details

(Keywords: reporter-external, Whiteboard: [reporter-external] [web-bounty-form] [verif?])

Hello leets vulnerability is : INFORMATION DISCLOSE. BY GUESSING STRING INFORMATION IS GIVEN TO USER. example: 0xb4872bd2a53ff019 0xf22d2b24190d477f 0xf22d2b24190d477f 0x291dceb2b19fae84 0x7ab08aa5d51205f3 POC:https://youtu.be/JF6tC1dFqbI
Flags: sec-bounty?
Thank you for your report. The keyserver doesn't do input validation on the uid so you're seeing all sorts of junk sent by other users. The fact the data is public is, well, by design (it wouldn't be a very good public keyserver otherwise). I'm going to close this as invalid for now.
Group: websites-security
Status: UNCONFIRMED → RESOLVED
Closed: 7 years ago
Resolution: --- → INVALID
Flags: sec-bounty? → sec-bounty-
You need to log in before you can comment on or make changes to this bug.