Vulnerability Management

Bounty Report: How we discovered Uber’s developer applications were leaking client secret and server tokens

This post is about an information leakage vulnerability on Learn more about this vulnerability.

Anand Prakash

Written by Anand Prakash

February 19, 2019 | 3 min read

This post is about an information leakage vulnerability on We identified a public API endpoint of that could send back server tokens and client secrets for applications authorized by the account owner to access their Uber account.

This is being published with the permission of Uber under the responsible disclosure policy.

About Uber

Uber is a transportation network company (TNC) headquartered in San Francisco, California. Uber offers peer-to-peer ridesharing, taxi cab hailing, food delivery, and a bicycle-sharing system, among other services. The company operates in 785 metropolitan areas worldwide. As per Bloomberg’s report, Uber has a valuation of over $100 billion.

Vulnerability Description

As per Uber’s documentation:

“The secret for your application should be treated like your application’s password. Never share this with anyone, check this into source code, or post in any public forum. Additionally, this should not be distributed on client devices where users could decompile your code and access the secret. If you suspect your client_secret has been compromised, you may generate a new one in your application’s dashboard which will immediately invalidate the old secret.”

This could have been easily exploited by an attacker by connecting their account to any Uber application on production and then using the profile endpoint to retrieve server tokens and client secrets of the connected application in the API response.

Uber fixed this issue by removing this data from the API response, as reported. Uber publicly notified all developers of this vulnerability and asked developers to rotate secrets on a periodic basis.

Notification sent by Uber to developers.

Steps to Reproduce

Step #1

Attacker connects a random Uber developer application to their account using OAuth. A few examples of Uber developer applications are IFTTT, Payfare, and Bixby. It is not identified as a complicated procedure as of now.

Step #2

Once the above apps are connected by the attacker to their Uber account, they can use against the endpoint to get the developer application’s confidential data and other significant information of the application using the attacker’s session data.

The vulnerable Uber API Endpoint:

POST /api/getAuthorisedApps HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
content-type: application/json
x-csrf-token: XXX
Content-Length: 2

Data getting leaked in API response:


Disclosure Timeline

October 5th, 2018: Report sent to Uber’s Security team.

November 6th, 2018: Issue resolved by Uber. We asked Uber to notify all developers in case their app secrets were no longer confidential. We verified the fix.

December 20th, 2018: Uber replied, stating, “They are in the process of notifying the developers and in the process of putting up a long-term fix in place for this issue.”

February 8th, 2019: Uber rewarded us with a $5000 bounty and notified all developers via email about the same. The issue was publicly disclosed after the action was conducted.