CoinEx Global Disclosed Report

Bug bounty report CoinEx Web & Mobile

Sensitive data exposed ( Valid Usernames & Passwords ) for users leaked in public at [ www.coinex.com ]

Created date
Jun 07 2024

Target

https://www.coinex.com/en/

Vulnerability Details

Overview of the Vulnerability The Vulnerability is about leaked and valid usernames and password for managers and can be found in public i use waymore tool to grep this sensitive data

Validation steps

Steps to Reproduce Using Waymore to ==> you can get it using this steps

git clone https://github.com/xnl-h4ck3r/waymore.git
cd waymore
sudo python setup.py install

add api key in config.yml

URLSCAN_API_KEY: 3613457b-3898-47f0-873c-5a9fb3feae9f
VIRUSTOTAL_API_KEY: b40c6b4cfd008d964acda7e3bcc79fb25e660f289dbef747fd4100653edd71da

After install it and add your api key ==> Use this command python3 waymore.py -i www.coinex.com -mode U 00.png

Navigate to result folder you will find txt file waymore.txt Use this command to grep the emails and passwords cat results/www.coinex.com/waymore.txt|grep "@"

https://www.coinex.com/account/signin:[email protected]:Jose22622290
https://www.coinex.com/en/signin:[email protected]:Ikariam01
https://www.coinex.com/register:[email protected]:97314862@Ad
https://www.coinex.com/register,469073,2umZAXSY@
https://www.coinex.com/register:[email protected]:928417820LORA
https://www.coinex.com/en/signin:[email protected]:Shareef$4444
https://www.coinex.com/signin:[email protected]:pFwiASuQ98*
https://www.coinex.com/register:[email protected]:M0rteza1234

0.png Proof of Concept (PoC) at any URL that we get from waymore tool for example ==> https://www.coinex.com/en/signin:[email protected]:Ikariam01

Navigate to :https://www.coinex.com/en/signin?redirect=%2F And use the credentials we get Email : [email protected] Password : Ikariam01

1.png

2.png you will find that the username and password are valid but there is 2FA send to the mobile number or email I decided to stop testing and report the issue as it immediately because might be one of the user's 2FA not active and that might led to bypass the authentication and to let the final decision to you Thank you have a nice day

Attachments

00.png
2.png
0.png
1.png
CommentsReport History
Comments on this report are hidden
Details
Statedisclosed
Severity
None
Bounty
hidden
Visibilitypartially
VulnerabilitySensitive Data Exposure
Participants (3)
triage team
company admin
author