Massive Data Leak using Unauthenticated ARC GIS REST service
作者通过使用多种工具进行子域名扫描并手动检查发现了一个返回503错误的子域名gis.example.com。进一步探索发现该子域包含一个未认证访问的ArcGIS REST服务接口,可导出包含大量敏感数据的ZIP文件。该漏洞被评为高危并获得赏金。 2025-7-1 11:59:22 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Ronak Patel

Hello Everyone! Hope You are doing Great!!!

This write-up is about my recently resolved bug as it belongs to Private program and with their permission i am writing this blog with redacted details.

I started working with recon on this domain, I would call “example.com” ,I generally use tools like assetfinder,subfinder,sublister to find the subdomains then sort their output in a single file for the unique result.

sort -u asset_example.txt sublister_example.txt subfinder_example.txt > rec_example.txt

I filter this output with the httpx to get the live subdomain as below

cat rec_example.txt | httpx > rec_httpx.txt

In this particular case rec_example.txt contained around six subdomains only so i decided to inspect each entry instead of relying on httpx.

One subdomain found was “gis.example.com”. Upon browsing it gave me status code 503 service unavailable. so as usual we skip to next subdomain but i did perform nuclei scan on this subdomain which reveled result

Rest endpoint at “gis.example.com/server/rest/services”

I immediately fired this endpoint and it was containing ARC GIS 11.1 server Rest endpoint.

ARC GIS REST SERVICE

As you can see it contains different endpoints like country ,utilities and more. I tried to access Country endpoint and it brought me to login endpoint and gave me 503 service unavailable as below.

Service Unavailable

But if we see directory there is service ExportCSV as seen below

ExportCSV

Upon exploring this option brought me to the Task submitting UI so that does mean it allowed unauthenticated user.

TaskSubmitUI

Next i submitted the task and it generated output in zip file

Submit Task
Output_Generated

As this is the Insurance company the output contained massive data of the farm profiles like location of the farms, crops ,third party auditing status ,soil health ,property name, tenancy and more data.

This bug was marked with the severity of 7.5 (High) and i was rewarded with Bounty accordingly.

Takeaway: After this finding i though if i relied on httpx output than i would have missed this bug as subdomain was giving 503 status. Always rely in multiple ways to recon.

Disclaimer: This research was part of the Bug bounty program. If someone does unauthorized activity on unauthorized asset inspiring by this than i am not responsible.


文章来源: https://infosecwriteups.com/massive-data-leak-using-unauthenticated-arc-gis-rest-service-7a59ca13ca28?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh