paint-brush
Shopclues user data leak via short linksby@fallible
672 reads
672 reads

Shopclues user data leak via short links

by FallibleMay 20th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<a href="https://en.wikipedia.org/wiki/ShopClues" target="_blank">Shopclues</a> is an Indian unicorn ecommerce marketplace. Every user who places an order on Shopclues receives a text message with a link to track the order.

Company Mentioned

Mention Thumbnail
featured image - Shopclues user data leak via short links
Fallible HackerNoon profile picture

Shopclues is an Indian unicorn ecommerce marketplace. Every user who places an order on Shopclues receives a text message with a link to track the order.

The short links e.g. — http://sclu.es/3zlVa http://sclu.es/3zlVa, http://sclu.es/3zlVb, http://sclu.es/3zlVc were actually serially iterable, , .. etc are all valid links which reveals name, phone numbers, email, home address, order details of Shopclues users. A simple script to iterate over all of them can be written as follows:

We reported this to Shopclues in the first week of March 2017. We received no acknowledgment email from them. A separate email sent to their cofounders did not receive any response. We rechecked the issue on 20 March and it was not fixed but we found it fixed on 3 May 2017. The URL now asks for email id & phone number to confirm that the request is made by the authorised user.

Important Learning

As a developer its important to understand that you do not keep sensitive and private data behind short links without authentication — how short are short links, you ask? Lets do a little math to understand this, if the code is 6 alphabets long (all caps), we have these many possibilities:

You may think that this is a huge number, no one can guess any random link. And that would be correct except that depending on how many links you have generated till now, the guessability of links goes on increasing. Lets say you are an E-commerce website which has generated 1 million short links. Now if you divide:

On an average, with every 308 wrong guesses one will be able to guess a correct link. So, if you decide to put user personal sensitive data behind short links which can be accessed by anyone without authentication, think again.

The vulnerability in case of Shopclues was even more severe as they didn’t even randomize the short links (though it does look gibberish if you just look at a single link and not a bunch of links together), they have merely incremented it serially.

Do something to increase the sample space of non-working short links — make the sample space huge that it makes the guessing (almost) impossible.

Try a combination of these:

  • Generate short links randomly, not serially.
  • Use longer id in short links rather than 5 or 6 characters — determine the length depending on how many active links you will have at a time.
  • If you really need to put sensitive data behind short links, you will have to use additional layer of authentication and authorization.