Have some more testing to do to 100% confirm it, but I am pretty sure I have accidentally stumbled across a stupidly devastating security/privacy bug in one of the most commonly used enterprise SaaS products on the market. If my remaining tests play out as I’m expecting, it’d be a stalkers / identity thief’s dream.

Confirmed this today and reported it.

Essentially, the vulnerability in the tool is that *in a specific circumstance* - which is that person has an existing account in the product from a previous employer (which many people do, since its so widely used), all you need is their personal email address.

With that you can address, without any further interaction from the victim, the tool will give you their:

- date of birth
- ssn
- last known street address
- phone number

Oh and any banking info on file
Good response from the vendor security team on this, got a reply in less than 12 hours, treating it as a valid critical bug.
Since it’s been a month, a quick update on this one: the confirmed “valid critical bug” that was acknowledged by this vendor within 12 hours is still present, still exposing all the things….

It’s been 5 months now.

I submitted this issue through a managed bug bounty program.

The vendor acknowledged it pretty quickly (within 12 hours), but I’ve had little info since then. It sits open in the queue. The labels “P1” “Critical” and “Unresolved” adorn the bug bounty tracker UI.

The company that manages the bug bounty has been unable to get them to respond.

A reminder that if you are going to do a bug bounty, you should do it properly.

so i get daily emails from Bugcrowd on this now.

Basically they are saying, “we have been unable to get a response from the customer - we’ll keep trying.”

so i suggested that they just cut off their customer from receiving further submissions if they aren’t responding and seemingly just want free pen testing. simple.

ah but then they wouldn’t get paid…

8 months after i reported this, the vendor is due to push a fix this week (they eventually got back to me)

vuln has been there this whole time

will they actually fix? who knows