Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,了解它的主要内容。 看起来这是一份安全公告,提到了Suno.com发现了三个高危漏洞。第一个是JWT令牌泄露,第二个是对象级别授权不足(IDOR),第三个是资源消耗过多导致的DoS攻击。这些漏洞的风险等级都是高的。 接下来,我需要把这些信息浓缩到100字以内。可能的结构是先点出公司和漏洞数量,然后分别列出每个漏洞的名称和影响。最后提到厂商的回应情况和披露的时间。 要注意用词简洁,避免重复。比如“High-Severity Vulnerabilities”可以简化为“高危漏洞”。同时,要确保所有关键信息都被涵盖:JWT泄漏、IDOR、DoS,以及厂商未妥善处理披露的情况。 最后检查一下字数,确保不超过限制。这样用户就能快速了解文章的核心内容了。 </think> Suno.com发现三个高危漏洞:JWT令牌泄露、对象级别授权不足(IDOR)及资源消耗过多导致的DoS攻击。这些问题可能导致账户接管、隐私泄露及服务中断。厂商未妥善处理披露事宜,已于10月10日公开披露。 2025-10-14 03:23:56 Author: seclists.org(查看原文) 阅读量:112 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Christopher Dickinson via Fulldisclosure <fulldisclosure () seclists org>
Date: Fri, 10 Oct 2025 16:51:48 +0200 (CEST)

Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com

CVE Identifiers

* CVE-2025-[PENDING] - Excessive Data Exposure / JWT Token Leakage
* CVE-2025-[PENDING] - Broken Object Level Authorization (IDOR)
* CVE-2025-[PENDING] - Unrestricted Resource Consumption (DoS)

Executive Summary
This security advisory details three significant vulnerabilities discovered in the Suno.com web application and API 
infrastructure on October 9, 2025. The vulnerabilities include exposure of active JWT session tokens, broken 
authorization controls allowing unauthorized access to private user data, and unrestricted resource consumption 
enabling denial of service attacks.

Overall Risk Rating: HIGH
Vendor: Suno, Inc.
Affected Product: suno.com web application
Status: Disclosed to vendor October 9, 2025. Vendor failed to engage in coordinated disclosure properly. Public 
disclosure: October 10, 2025.

Disclosure Timeline
October 9, 2025 – Vulnerabilities discovered during security assessment
October 9, 2025 – Initial disclosure email sent to Suno with redacted report
October 10, 2025 – Vendor responded disputing Finding 1, claimed unable to reproduce Finding 2
October 10, 2025 – Researcher provided specific endpoint paths and attack methodology
October 10, 2025 – Vendor proposed Google Forms for proof-of-concept transmission
October 10, 2025 – Researcher rejected insecure channel, offered 5 secure alternatives with no response
October 10, 2025 – Public disclosure initiated, CVE requests submitted

Vulnerability Details

Finding 1: Excessive Data Exposure / JWT Token Leakage
CVE-2025-[PENDING]
Severity: HIGH
CVSS 3.1 Score: 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)
CWE: CWE-359 (Exposure of Private Information)
OWASP API Security: API3:2023 - Broken Object Property Level Authorization

Description
Multiple API endpoints return excessive sensitive data in JSON response bodies, including active JWT session tokens, 
full user PII, OAuth provider details, and internal application state. Most critically, the session management endpoint 
exposes the active JWT token in plaintext JSON accessible to JavaScript.

Affected Components
/v1/client/sessions/{session_id}/touch (clerk.suno.com)
/api/feed/v2 (studio-api.prod.suno.com)
/api/user/user_config/ (studio-api.prod.suno.com)
/api/discover (studio-api.prod.suno.com)

Attack Vector

1. User authenticates normally to suno.com
2. Malicious browser extension monitors network traffic
3. Extension intercepts API response from /v1/client/sessions/{session_id}/touch
4. Attacker extracts JWT token from JSON response body
5. Attacker uses stolen JWT to hijack victim’s session in separate browser/device
   No user interaction required beyond normal application usage.

Proof of Concept (Redacted)
Request and response data show that the “last_active_token.jwt” field contains the active session token.

Impact

* Account takeover via stolen JWT
* Privacy breach (full PII exposure)
* MFA bypass
* Potential mass exploitation
* Reconnaissance for further attacks

Validation
Controlled accounts were used to verify JWT theft and reuse for full session hijacking.

Remediation

* Remove JWT from all API response bodies
* Store JWT in HttpOnly, Secure cookies only
* Implement token rotation
* Apply strict data filtering and minimize PII in responses
* Audit endpoints for excessive data exposure

Finding 2: Broken Object Level Authorization (IDOR)
CVE-2025-[PENDING]
Severity: HIGH
CVSS 3.1 Score: 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
CWE: CWE-639 (Authorization Bypass Through User-Controlled Key)
OWASP API Security: API1:2023 - Broken Object Level Authorization

Description
The API fails to perform proper server-side authorization checks on user_id parameters, allowing authenticated users to 
access private content belonging to other users.

Affected Components
/api/feed/v2 (studio-api.prod.suno.com)
/api/user/user_config/ (studio-api.prod.suno.com)
User content retrieval endpoints

Attack Vector

1. Attacker enumerates user IDs from /api/discover
2. Attacker uses victim’s user_id to query /api/feed/v2
3. Server returns private content without ownership validation

Impact

* Complete privacy breach
* Horizontal privilege escalation
* Mass data exfiltration
* Intellectual property theft
* Reconnaissance

Validation
Testing confirmed that one authenticated user could access another’s private data with no authorization check.

Remediation

* Enforce server-side ownership validation
* Match JWT user_id to requested resource
* Centralize and audit authorization logic
* Implement cross-user access logging
* Remove user_id parameters where unnecessary

Finding 3: Unrestricted Resource Consumption (DoS)
CVE-2025-[PENDING]
Severity: MEDIUM
CVSS 3.1 Score: 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CWE: CWE-770 (Allocation of Resources Without Limits)
OWASP API Security: API4:2023 - Unrestricted Resource Consumption

Description
The /api/clips/get_songs_by_ids endpoint allows excessive IDs in one request without limits, causing potential resource 
exhaustion and DoS conditions.

Affected Components
/api/clips/get_songs_by_ids (studio-api.prod.suno.com)
/api/feed/v2 (with large page sizes)

Impact

* Denial of Service and resource exhaustion
* Service degradation
* Cascading backend failures
* Low barrier for exploitation

Remediation

* Enforce strict limit on batch request size
* Implement rate limiting and throttling
* Paginate large requests
* Add monitoring and circuit breakers

Vendor Response
Suno was notified with a formal report, business impact analysis, and secure disclosure channel options.

Vendor Response Pattern
Finding 1: Dismissed due to misunderstanding of client-side risk.
Finding 2: Claimed unreproducible despite full details.
Finding 3: Partially acknowledged without clear remediation.

Insecure Disclosure Channel
Vendor proposed Google Forms for exploit transmission, rejected due to lack of encryption, control, and auditability.

Decision to Disclose Publicly
After repeated non-engagement, public disclosure was initiated per standard 90-day coordinated disclosure norms to 
protect users.

Testing Methodology
Framework: Penetration Testing Execution Standard (PTES)
Phases: Reconnaissance, Scanning, Vulnerability Assessment, Exploitation, Documentation
Scope: suno.com, studio-api.prod.suno.com, clerk.suno.com
Testing used only researcher-owned accounts and avoided destructive actions.

Recommendations for Users

* Assume session tokens may be compromised
* Monitor account activity
* Treat private content as potentially exposed
* Expect possible service disruption
* Limit sensitive use until remediation confirmed

Recommendations for Suno
Immediate Actions:

* Fix JWT exposure, IDOR, and DoS endpoints immediately
* Enforce secure token storage and strict authorization
  Long-Term:
* Establish formal security contact and program
* Conduct OWASP API audit and external review
* Integrate secure coding and testing in CI/CD
* Implement disclosure and incident response policy

References
OWASP API Security Top 10
CWE-359, CWE-639, CWE-770
PTES
Google Project Zero Disclosure Policy

Credit
Discoverer: Christopher Dickinson
Disclosure Date: October 10, 2025
CVE Requests Submitted: October 10, 2025

Contact
Email: chris.dickinson () mailfence com

Legal
Testing was ethical, limited, and non-destructive using researcher-controlled accounts.
No user data was accessed or exfiltrated.
Disclosure made in the interest of public safety.

Disclaimer: Provided for educational and defensive purposes only. The author is not responsible for misuse.

Last Updated: October 10, 2025
Christopher Dickinson
Veteran | IT Professional | Cybersecurity Student | Business Management


-- 
Sent with https://mailfence.com  
Secure and private email
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS) Christopher Dickinson via Fulldisclosure (Oct 13)

文章来源: https://seclists.org/fulldisclosure/2025/Oct/8
如有侵权请联系:admin#unsafe.sh