Inspectiv | Unauthenticated Mass PII leak via IDOR

https://app.inspectiv.com (Redacted Program)

Redacted Target on Inspectiv bug bounty program

The Illusion of Security

In the interconnected world of modern applications, what appears dead often conceals living threats. This case study documents my discovery of a Insecure Direct Object Reference (IDOR) vulnerability in a <redacted> platform, where expired tokens showed harmless "404 Not Found" pages while dead and active tokens silently leaked user records (PII + Reset Tokens).

  1. The VirusTotal Revelation

The Initial Clue During routine reconnaissance, a VirusTotal domain report revealed a cryptic entry:

https://virustotal.com/vtapi/v2/domain/report?apikey=<Virustotal_API_Key>&domain=target.comarrow-up-right

  • Direct access to the endpoint showed a 302 found --> PII leak on Location Header --> follow redirect returns Firebase 404 page, which means this were once a valid token

Weaponizing Token Entropy:

  1. Generate Token Wordlist with all possible 4-character tokens unique combinations (a-z, A-Z, 0-9):

FUZZ the 4-character token endpoint with our generated wordlists. https://github.com/ffuf/ffufarrow-up-right

(we add the Header "X-Inspectiv-Tester" for their tracking and audit purposes)

This screenshot shows 10 million out of 14,776,336 requests and it took me 8-10 Hours to finish all the possible combinations and extract every PII registered into the Web/Mobile app.

The Inspectiv security team provided me with a test account (which turned out to be for a private bug bounty program domain I stumbled into) to demonstrate a full account takeover via "Forgot password" functionality. I successfully executed this on the test account they gave me without affecting or violating other users.

Impact:

  • Mass PII Harvesting: 14.7M tokens can be enumerated in less than 10 hours ( Old 4-Character Token = PII leak persistence bug)

  • Account Takeover via unused reset tokens

  • Compliance and Privacy Violations

Reference:

(This supposed to be critical in my opinion :V )

Conclusion:

Security through obscurity fails when tokens follow predictable lifecycles

For developers:

  • Design tokens with high entropy, short-lived, and access-controlled.

  • Implement Rate-limiting

  • Treat production tokens like nuclear codes especially for unused tokens- never expose them to third-party scanners (eg. Virus total). What VirusTotal archives, attackers will find."

For bug hunters:

  • When you find tokens in VT archives, recognize they represent security process failures beyond technical flaws. Analyze the archived endpoints via burpsuite or Chrome devtools.

and remember:

always seek permission before conducting any potentially disruptive tests such as overloading them with massive requests. Actions like these are generally violates the company code and conduct.

(Hard earned lesson for me).

https://x.com/0xLuX1eL/status/1940666065719382102arrow-up-right

Update:

I've developed an automation tool that streamlines the process of enumerating VirusTotal domain reports, extracting URLs, and recursively discovering subdomains. This tool is designed to save significant time during reconnaissance workflows.

Check it out here: https://github.com/0xLuxieL/VT-Reconarrow-up-right

Thats it for for this section and thanks for reading! 👋

Last updated