230 – Business information leak - Firestore
Description
When attempting to activate a plan, it is evident that the responses to firestore API requests contain user credentials.
Impact
Obtain credentials from other services.
Recommendation
Ensure that responses to requests do not contain confidential information.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: L
- Attack Requirements: N
- Privileges required: N
- User interaction: N
- Confidentiality (VC): L
- Integrity (VI): N
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P