Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Cybersecurity
  3. Vulnerabilities & Exploits
  4. πŸ›‘ How I Discovered Sensitive Student Info on a Government Education Portal! πŸ›‘

πŸ›‘ How I Discovered Sensitive Student Info on a Government Education Portal! πŸ›‘

Scheduled Pinned Locked Moved Vulnerabilities & Exploits
2 Posts 2 Posters 126 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • anonsathan_xdA Offline
    anonsathan_xdA Offline
    anonsathan_xd
    Global Moderator
    wrote on last edited by
    #1

    πŸ›‘ ###### How I Discovered Sensitive Student Info on a Government Education Portal! πŸ›‘

    Hey Community! πŸ‘‹

    I was doing some basic security research on a few local domains and stumbled upon a serious Information Disclosure vulnerability. I wanted to share my findings (without naming the exact target for security reasons) to highlight how critical API security is.
    The Target: [A Sri Lankan Government Educational Portal] 🎯

    Vulnerability Type: Broken Object Level Authorization (BOLA) / Unprotected API Endpoint.

    proof.jpg

    How to do it step by step? πŸ•΅οΈβ€β™‚οΈ

    1. Random Selection 🎲 I decided to check the security posture of a well-known educational portal in Sri Lanka. I started by exploring the site’s structure and how it handles data requests.

    2. Identifying the Attack Surface πŸ’» While browsing, I noticed the site was using an API to fetch some front-end data. This piqued my curiosity.

    3. πŸ§ͺ I tried to guess common API endpoints. Instead of navigating the UI, I manually appended a common path to the root URL: https://[target_site].gov.lk/api/users/

    4. The Success (Data Exposure) πŸ’₯ To my absolute shock, the server didn't ask for a login or a token. It responded with a massive JSON array containing:

      Full Names / Emails/ Mobile numbers / Birthdays / Nic numbers of Students πŸ‘€

    Why Is This Dangerous? ⚠️

    No Authentication: The API endpoint was completely public. Anyone with the link could download the entire user database.
    
    Massive Privacy Breach: Thousands of students' personal info could be harvested by bots within seconds. πŸ€–
    
    Identity Theft: This data is a goldmine for phishers and scammers targeting students. 🎣
    

    How to Fix This? (For Admins) πŸ› οΈ

    Implement Authentication: Never leave /api/ endpoints open. Use JWT or API keys.
    
    Rate Limiting: Prevent automated scripts from scraping the entire database.
    
    Role-Based Access Control (RBAC): Ensure that only authorized admins can access the /users/ list.
    

    Conclusion πŸ’‘

    This just goes to show that you don't always need complex tools to find a "hole" in a system. Sometimes, a simple URL tweak is all it takes. I hope the developers of this site fix this ASAP! πŸ›‘

    What do you guys think? Is API security being ignored in our local gov-tech sector? Let’s discuss below! πŸ‘‡

    #CyberSecurity #LK #BugBounty #InfoSec #DataPrivacy #EthicalHacking #AnonSathaN #SriLanka

    1 Reply Last reply
    πŸ‘
    2
    • DevilXD Offline
      DevilXD Offline
      DevilX
      Global Moderator
      wrote on last edited by
      #2

      ΰΆ½ΰΆ‚ΰΆšΰ·ΰ·€ΰ·š ࢯැࢱࢧ ΰΆ­ΰ·’ΰΆΊΰ·™ΰΆ± ࢜ොࢩ්࢚ government sites ΰ·€ΰΆ½ ࢸේ ΰΆšΰ·šΰ·ƒΰ·Š ΰΆ‘ΰΆš ΰΆ­ΰ·’ΰΆΊΰ·™ΰΆ±ΰ·Šΰ·€ΰ·.

      1 Reply Last reply
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Don't have an account? Register

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups