Skip to content

Instantly share code, notes, and snippets.

@whoisrushi
Created October 29, 2025 07:54
Show Gist options
  • Select an option

  • Save whoisrushi/7e8d15c85221e3f708b7b480e04ab6ca to your computer and use it in GitHub Desktop.

Select an option

Save whoisrushi/7e8d15c85221e3f708b7b480e04ab6ca to your computer and use it in GitHub Desktop.
Sensitive Information Disclosure via Publicly Accessible JSON File
Summary:
A sensitive data exposure vulnerability exists in the users.json file located in the /json/ directory. The file contains plaintext user credentials, including usernames, passwords, and personal addresses, and can be accessed without any authentication.
This allows any unauthenticated user to retrieve sensitive data directly from the web server.
Steps to Reproduce:
Open the following URL in a browser (no login required): http://localhost/GroceryMart/json/users.json
Observe that the file returns user details in plaintext:
{
"username": [
{
"firstname": "Rajesh",
"lastname": "Kumar",
"username": "Rajesh23",
"address": "A/23 Noida",
"password": "rajesh123"
},
Vendor of the product(s) info
Vendor/Developer: Komal97
GitHub Repository: Komal97/GroceryMart (https://github.com/Komal97/GroceryMart)
Affected product(s)/code base info
Product: GroceryMart
Affected File: /json/users.json
Version: Latest commit 21934e6 (Oct 23, 2020)
Impact:
An attacker can obtain the full list of user credentials (including plaintext passwords and addresses) without authentication.
This results in:
Unauthorized access to all user accounts
Potential identity theft and account compromise
Privacy and legal violations (PII exposure)
High reputational damage for the vendor
Affected Project:
GitHub Repository: Komal97/GroceryMart (https://github.com/Komal97/GroceryMart)
File Path: /json/users.json
Tested On: Latest commit 21934e6 (Oct 23, 2020)
Recommendation:
Remove users.json from any web-accessible directory.
Never store plaintext passwords — use secure hashing (e.g., bcrypt, Argon2).
Restrict direct access to JSON or data folders via server configuration:
Apache (.htaccess):
Deny from all
Nginx:
location /GroceryMart/json/ {
deny all;
}
Implement authentication and authorization checks before serving sensitive data.
Replace static JSON storage with a secure backend database.
Use environment-based configurations to prevent test data from leaking in production.
Discovered by:
Team DisclosureX
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment