From Google Dorking to Information Disclosure

MikeChan
2 min readSep 18, 2021
Photo by Christian Wiediger on Unsplash

This is a story about how I used google dorking to find sensitive information exposed in a private VDP program. This is a rather short story but I think it is quite interesting. So, I was like why not sharing it?

So, it was just another day of hunting. I was hunting on a private VDP program. Let’s call it redacted.com. I just started hunting on it. So, I was like why not try to find something juicy from google? So, I just put in some random google dorking in its search box and nothing seems interesting to me until the one below:

site:redacted.com inurl:admin "@gmail.com"

I found a page where exposed all user’s email addresses of my target. Then, I found an edit button next to each address. So, I just click on it. And the below screen popped:

And Boom! It disclosed all information including password of the users which stored in PLAIN TEXT!! Also, I can even edit or delete these records. This endpoint exposed over 38k user’s record.

So, I quickly reported this issue to the program. The issue was latter fixed but as this is a VDP program, bounty for this bug was zero. Nevertheless, I earned 100% appreciation from the company.

Hope you enjoy this writeup and see you next time.

--

--

MikeChan
MikeChan

Written by MikeChan

Cybersecurity, Part-time bug bounty hunter. Support me by subscribe: https://mikekitckchan.medium.com/membership. Ping me for online private tutoring.

No responses yet