Unauthenticated Image Access and EXIF Location Leak, Easy P4, you can find under 2 mins
嗯,用户让我总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是一个安全漏洞,作者在某个网站上发现了这个问题。这个网站允许用户上传个人资料照片,但上传的照片没有去除EXIF元数据,特别是地理位置数据。作者测试后发现,通过构造URL可以直接访问这些图片,并且使用在线工具提取了EXIF信息。 所以,总结的时候需要包括几个关键点:网站漏洞、上传照片保留EXIF数据、地理位置暴露、URL直接访问以及测试结果。我得把这些信息浓缩到100字以内,同时保持语言简洁明了。 可能会这样组织:先说明漏洞类型和位置,然后描述问题(保留EXIF和地理位置),接着讲如何访问图片和测试结果。这样就能全面覆盖主要内容了。 最后检查一下字数,确保不超过限制,并且表达清晰。这样用户就能快速了解文章的核心内容了。 </think> 文章描述了一个安全漏洞:某网站允许用户上传包含完整EXIF元数据(包括地理位置信息)的个人资料照片,并且这些照片可通过特定URL直接访问。测试发现上传的图片未被服务器端去除EXIF数据。 2026-2-18 09:9:19 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Devansh Patel

Hello people. Here’s another blog; this one is another bug you can find real quick.

This one I found on a website which has profile photos of accounts, and where the photo you upload does not strip the EXIF metadata and had geoloaction data gettable from the photo.

Press enter or click to view image in full size

Generated by Gemini

So the thing that happened is I was checking out the application, i setup my account there and added a photo for my profile, and I got to know that the profile picture URL looks like:

https://subdomain.redacted.com/Accounts/somedirectory/[email protected]/ProfileImages/imgfile.jpg

This was the point I thought, what would happen if this were publicly accessible, and I copied the link and pasted it in a private window, and it was publicly accessible.

So I confirmed that I can check for EXIF data not stripped, so I went to the website to check for EXIF data from the img :

https://exifinfo.org/

Press enter or click to view image in full size

I put the URL in here and got the EXIF data as it was getting stripped from the server side:


文章来源: https://infosecwriteups.com/unauthenticated-image-access-and-exif-location-leak-easy-p4-you-can-find-under-2-mins-88e5a9064a91?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh