Unauthenticated Image Access and EXIF Location Leak, Easy P4, you can find under 2 mins
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接描述文章内容。 首先,我仔细阅读了文章。作者描述了一个发现安全漏洞的过程。他上传了一张带有EXIF数据的头像到某个网站,发现上传的照片没有被剥离元数据,导致地理位置信息可以被获取。接着,他测试了图片链接是否公开可访问,并确认了这一点。最后,他使用在线工具检查了EXIF数据,发现确实存在未被处理的元数据。 接下来,我需要将这些关键点浓缩成100字以内。要确保涵盖主要事件:上传头像、发现EXIF未被剥离、测试链接公开访问、检查EXIF数据结果。 可能会这样组织句子:作者上传头像到网站,发现照片未剥离EXIF数据和地理位置信息。测试后确认图片链接公开可访问,并通过工具验证了EXIF数据的存在。 这样既简洁又全面地概括了文章内容。 </think> 作者在某网站上传包含EXIF数据的头像后发现照片未剥离元数据和地理位置信息。通过测试确认图片链接公开可访问,并使用在线工具验证了EXIF数据的存在。 2026-2-18 09:9:19 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Devansh Patel

Hello people. Here’s another blog; this one is another bug you can find real quick.

This one I found on a website which has profile photos of accounts, and where the photo you upload does not strip the EXIF metadata and had geoloaction data gettable from the photo.

Press enter or click to view image in full size

Generated by Gemini

So the thing that happened is I was checking out the application, i setup my account there and added a photo for my profile, and I got to know that the profile picture URL looks like:

https://subdomain.redacted.com/Accounts/somedirectory/[email protected]/ProfileImages/imgfile.jpg

This was the point I thought, what would happen if this were publicly accessible, and I copied the link and pasted it in a private window, and it was publicly accessible.

So I confirmed that I can check for EXIF data not stripped, so I went to the website to check for EXIF data from the img :

https://exifinfo.org/

Press enter or click to view image in full size

I put the URL in here and got the EXIF data as it was getting stripped from the server side:


文章来源: https://infosecwriteups.com/unauthenticated-image-access-and-exif-location-leak-easy-p4-you-can-find-under-2-mins-88e5a9064a91?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh