Researcher reveals evidence of private Instagram profiles leaking photos
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,理解主要信息。 文章讲的是安全研究员Jatin Banga发现Instagram的某些私人账户在HTML响应中泄露了照片链接。当未认证用户访问这些账户时,虽然显示“此账户已设为私密”,但HTML源代码中包含指向私人照片的链接和说明。Meta修复了这个问题,但后来关闭了报告,称无法复现漏洞。 接下来,我需要提取关键点:研究者、问题、影响、Meta的反应。然后用简洁的语言把这些点连贯起来,确保不超过100字。 可能会遇到的问题是信息太多,需要精简。比如“某些情况下”可以简化为“特定情况下”。同时要确保不遗漏重要细节,比如Meta关闭报告的原因。 最后检查字数和流畅度,确保总结准确且符合用户要求。 </think> 安全研究员发现Instagram部分私人账户在HTML响应中泄露照片链接,尽管页面显示"此账户已设为私密"。Meta修复后关闭报告称无法复现漏洞。 2026-1-31 14:45:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Instagram

A security researcher has published detailed evidence showing that some Instagram private profiles returned links to user photos to unauthenticated visitors.

Instagram's private account feature is designed to restrict photos, videos, stories, and reels to approved followers. However, the researcher's findings show that, in certain cases, private profile content was embedded in publicly accessible server responses.

According to the researcher, Meta fixed the issue after his report was submitted but later closed it as "not applicable," stating the vulnerability could not be reproduced.

Wiz

Private Instagram profiles leaking photos

Security researcher Jatin Banga has recently demonstrated how certain private Instagram profiles were leaking links to private photos from these accounts—in the HTML response body itself.

When accessed by an unauthenticated user from certain mobile devices, private Instagram profiles (such as the researcher-created https://instagram.com/jatin.py) display the standard message: "This account is private. Follow to see their photos and videos."

A sample private Instagram profile when accessed by an unauthenticated user
A sample private Instagram profile when accessed by an unauthenticated user

However, in the HTML source code for affected profiles, links to some private photos as well as captions were embedded in the page response.

In Banga's example, the polaris_timeline_connection JSON object returned in the HTML contained encoded CDN links to photos that should not have been accessible.

HTML source code returning links to private photos
HTML source code returning links to private photos

The video proof-of-concept (PoC) shared by Banga and embedded below demonstrates the data leak vulnerability in action.

By limiting the formal testing to private test profiles Banga had created or had explicit permission to use, he found that at least 28% of these accounts were returning captions and links to private photos:

Meta quietly fixed the issue after report, researcher says

The researcher states that he shared his findings with Instagram's parent company, Meta, as early as October 12, 2025.

Meta initially classified the issue as a CDN caching problem, a characterization the researcher disputed.

"This wasn't a CDN caching issue — Instagram's backend was failing to check authorization before populating the response," Banga wrote, describing it as a server-side authorization failure.

Banga created a second bug report clarifying the issue, but did not reach a satisfactory resolution with the company despite a lengthy discussion spanning days.

According to the researcher, after repeated exchanges, the case was closed as "not applicable" but the exploit stopped working around October 16.

"The standard coordinated disclosure window is 90 days. I gave Meta 102 days and multiple escalation attempts. The exploit stopped working on all accounts I tested — though without root cause analysis from Meta, there's no confirmation the underlying issue is truly resolved," he continues.

In addition to his disclosure and the GitHub repository documenting extensive evidence of the flaw and communications with Meta, Banga shared additional materials with BleepingComputer to demonstrate the existence of the flaw.

We asked Banga why he did not archive the test private profile using a public service like the Internet Archive's Wayback Machine, which could have preserved the HTML source code with the links to private photos present, thereby indisputably confirming the presence of a bug.

"The Wayback Machine doesn't send the specific Mobile User-Agent and Headers required to trigger this server-side leak, so their crawlers couldn't capture it," the researcher clarified to BleepingComputer.

In the published correspondence, a Meta vulnerability triage analyst wrote:

Meta response to Instagram private profile leak bug
Meta's response to Instagram private profile leak bug (Jatin B.)

Ultimately, during the course of the conversation, the analyst is seen stating:

"The fact that an unreproducible issue was fixed doesn't change the fact that it was not reproducible at the time. Even if the issue were reproducible, it's possible that a change was made to fix a different issue and this issue was fixed as an unintended side effect."

"I want to emphasize that I am not chasing a bounty here. By going public with this disclosure, I have forfeited any chance of a reward," Banga told BleepingComputer via email.

"The goal is transparency. Meta patched a critical privacy leak 48-96 hours after my report but refused to acknowledge it, dismissing it as an 'unintended side effect.' Their negligence and reluctance to investigate the actual root cause—despite having the logs—is the real issue."

"Nobody knows how long this has been actually exploited for, since it was not so hard to find."

BleepingComputer contacted Meta for comment on three separate occasions well in advance of publication but did not receive a response.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/researcher-reveals-evidence-of-private-instagram-profiles-leaking-photos/
如有侵权请联系:admin#unsafe.sh