Researcher reveals evidence of Instagram private profiles leaking photos
好的,我需要帮用户总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我要仔细阅读文章内容,找出主要信息。 文章讲的是安全研究员Jatin Banga发现Instagram的某些私人账户泄露了照片链接。即使用户没有登录,通过特定设备访问时,HTML源代码中会显示这些链接和描述。Meta在收到报告后修复了问题,但后来关闭了报告,称无法复现漏洞。 接下来,我需要将这些关键点浓缩到100字以内。重点包括:研究员发现漏洞、泄露的照片链接、Meta的修复和关闭报告的原因。 最后,确保语言简洁明了,不使用复杂的术语,并且直接描述事件。 </think> 安全研究员发现Instagram部分私人账户在HTML响应中泄露照片链接和描述。Meta修复后以“无法复现”关闭漏洞报告。 2026-1-31 14:30:29 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Instagram

A security researcher has published detailed evidence showing that some Instagram private profiles returned links to user photos to unauthenticated visitors.

Instagram's private account feature is designed to restrict photos, videos, stories, and reels to approved followers. However, the researcher's findings show that, in certain cases, private profile content was embedded in publicly accessible server responses.

According to the researcher, Meta fixed the issue after his report was submitted but later closed it as "not applicable," stating the vulnerability could not be reproduced.

Wiz

Private Instagram profiles leaking photos

Security researcher Jatin Banga has recently demonstrated how certain private Instagram profiles were leaking links to private photos from these accounts—in the HTML response body itself.

When accessed by an unauthenticated user from certain mobile devices, private Instagram profiles (such as the researcher-created https://instagram.com/jatin.py) display the standard message: "This account is private. Follow to see their photos and videos."

A sample private Instagram profile when accessed by an unauthenticated user
A sample private Instagram profile when accessed by an unauthenticated user

However, in the HTML source code for affected profiles, links to some private photos as well as captions were embedded in the page response.

In Banga's example, the polaris_timeline_connection JSON object returned in the HTML contained encoded CDN links to photos that should not have been accessible.

HTML source code returning links to private photos
HTML source code returning links to private photos

The video proof-of-concept (PoC) shared by Banga and embedded below demonstrates the data leak vulnerability in action.

By limiting the formal testing to private test profiles Banga had created or had explicit permission to use, he found that at least 28% of these accounts were returning captions and links to private photos:

Meta quietly fixed the issue after report, researcher says

The researcher states that he shared his findings with Instagram's parent company, Meta, as early as October 12, 2025.

Meta initially classified the issue as a CDN caching problem, a characterization the researcher disputed.

"This wasn't a CDN caching issue — Instagram's backend was failing to check authorization before populating the response," Banga wrote, describing it as a server-side authorization failure.

Banga created a second bug report clarifying the issue, but did not reach a satisfactory resolution with the company despite a lengthy discussion spanning days.

According to the researcher, after repeated exchanges, the case was closed as "not applicable" but the exploit stopped working around October 16.

"The standard coordinated disclosure window is 90 days. I gave Meta 102 days and multiple escalation attempts. The exploit stopped working on all accounts I tested — though without root cause analysis from Meta, there's no confirmation the underlying issue is truly resolved," he continues.

In addition to his disclosure and the GitHub repository documenting extensive evidence of the flaw and communications with Meta, Banga shared additional materials with BleepingComputer to demonstrate the existence of the flaw.

We asked Banga why he did not archive the test private profile using a public service like the Internet Archive's Wayback Machine, which could have preserved the HTML source code with the links to private photos present, thereby indisputably confirming the presence of a bug.

"The Wayback Machine doesn't send the specific Mobile User-Agent and Headers required to trigger this server-side leak, so their crawlers couldn't capture it," the researcher clarified to BleepingComputer.

In the published correspondence, a Meta vulnerability triage analyst wrote:

Meta response to Instagram private profile leak bug
Meta's response to Instagram private profile leak bug (Jatin B.)

Ultimately, during the course of the conversation, the analyst is seen stating:

"The fact that an unreproducible issue was fixed doesn't change the fact that it was not reproducible at the time. Even if the issue were reproducible, it's possible that a change was made to fix a different issue and this issue was fixed as an unintended side effect."

"I want to emphasize that I am not chasing a bounty here. By going public with this disclosure, I have forfeited any chance of a reward," Banga told BleepingComputer via email.

"The goal is transparency. Meta patched a critical privacy leak 48-96 hours after my report but refused to acknowledge it, dismissing it as an 'unintended side effect.' Their negligence and reluctance to investigate the actual root cause—despite having the logs—is the real issue."

"Nobody knows how long this has been actually exploited for, since it was not so hard to find."

BleepingComputer contacted Meta for comment on three separate occasions well in advance of publication but did not receive a response.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/researcher-reveals-evidence-of-instagram-private-profiles-leaking-photos/
如有侵权请联系:admin#unsafe.sh