Inspectiv | Chained Credential Leak & API Privilege Escalation

https://app.inspectiv.com | Private Program | Sandbox Environment

This Vulnerability is about a chain of issues that escalated from a low-privilege credential leak to full administrative control of an organization’s API. This case demonstrates GitHub reconnaissance, API abuse, and RBAC Logic flaw that enables admin access.


1. Reconnaissance (GitHub search)

  • Performed GitHub dorking:

  • Found hardcoded credentials in a public repository:

  • Verified against API sandbox domain:

2. Credential Verification

  • Credentials were valid but mapped to a low-privileged user role.

  • API responses returned real employee PII, including full legal names, company emails and identifiers that matched active LinkedIn profiles.

3. RBAC Logic Flaw

https://docs.<redacted>.com

  • Reviewed API documentation → found endpoint:

  • Using the leaked low-privileged token:

notably, this one also weirdly works (POST with empty body )

  • Response included new credentials with elevated privileges:

NOTE:

Encoding id:password to Base64 gives us Authorization: Basic <token>.

https://docs.<redacted>.com

4. Escalation & Full Impact

  • With admin token, I confirmed:

    • GET /users → full employee enumeration (emails, IDs).

    • GET /identities → personal information exposure.

    • POST /webhooks → ability to overwrite webhook targets and exfiltrate customer payment data.

  • Notably, the UI blocked this functionality, but direct API calls bypassed the restriction.

Impact

  • Unauthorized disclosure of employee and customer PII.

  • Privilege escalation from low-priv to admin via API-only logic flaw.

  • Potential compromise of payment and identity workflows (If not not fixed on live production).

https://x.com/0xLuX1eL/status/1963943038822039671arrow-up-right

Lessons

  • GitHub recon is critical — Public repos frequently contain sample keys, test creds, or example config files. Always run scoped dorks and secret-scaners (gitleaks / truffleHog) against an org’s public surface during recon.

  • Low-privilege != low impact — always validate what data is accessible.

  • UI != API parity — RBAC must be enforced at the API level, not only in frontend restrictions.

  • Chain vulnerabilities — individually low-severity bugs can escalate to higher compromise when combined.

  • Reading API documentation = underrated reconnaissance Docs and code examples tell you intended workflows, hidden endpoints, optional parameters, and expected request/response shapes, all useful for crafting minimal requests to probe for logic flaws. Treat docs as an extension of the attack surface.

Last updated