Headline
PlayTube 3.0.1 Information Disclosure
PlayTube version 3.0.1 suffers from an information leakage vulnerability.
# Exploit Title: PlayTube 3.0.1 - Redirect Information Disclosure# Exploit Author: CraCkEr# Date: 19/08/2023# Vendor: PlayTube# Vendor Homepage: https://playtubescript.com/# Software Link: https://demo.playtubescript.com/# Tested on: Windows 10 Pro# Impact: Sensitive Information Leakage# CVE: CVE-2023-4714# CWE: CWE-200 - CWE-284 - CWE-266## GreetingsThe_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushkaCryptoJob (Twitter) twitter.com/0x0CryptoJob## DescriptionInformation disclosure issue in the redirect responses, When accessing any page on the website,Sensitive data, such as app IDs, is being exposed in the body of these redirects.## Steps to Reproduce:When you visit most of pages on the website, such as the index page for example:https://website/in the body page response there's information leakage for "RazorPay Payment" id KEY+--------------------------------------+razorpay_options = { key: "rzp_test_ruz***********"+--------------------------------------+Note: The same information leaked, for the app ID KEY, was added to the "Payment Configuration" in the Administration PanelSettings of "Payment Configuration" in the Administration Panel, on this Path:https://website/admin-cp/payment-settings[-] Done
Related news
CVE-2023-4714
A vulnerability was found in PlayTube 3.0.1 and classified as problematic. This issue affects some unknown processing of the component Redirect Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. The identifier VDB-238577 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.