Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/vaibhavpandeyvpz/dtp-exploit-poc
Simple and single purpose PoC app built using React Native to demonstrate PII leak vulnerability in Delhi Traffic Police's notice payment website.
https://github.com/vaibhavpandeyvpz/dtp-exploit-poc
exploit information leak privacy security vulnerability
Last synced: about 1 month ago
JSON representation
Simple and single purpose PoC app built using React Native to demonstrate PII leak vulnerability in Delhi Traffic Police's notice payment website.
- Host: GitHub
- URL: https://github.com/vaibhavpandeyvpz/dtp-exploit-poc
- Owner: vaibhavpandeyvpz
- Created: 2021-05-29T18:07:27.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-06-02T13:59:21.000Z (over 3 years ago)
- Last Synced: 2024-11-09T00:12:06.228Z (3 months ago)
- Topics: exploit, information, leak, privacy, security, vulnerability
- Language: JavaScript
- Homepage: https://delhitrafficpolice.nic.in/notice/pay-notice/
- Size: 176 KB
- Stars: 1
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# dtp-exploit-poc
Simple and single purpose [PoC](https://en.wikipedia.org/wiki/Proof_of_concept) app built using [React Native](https://reactnative.dev/) to demonstrate [PII](https://en.wikipedia.org/wiki/Personal_data) leak vulnerability in **Delhi Traffic Police**'s [notice payment](https://delhitrafficpolice.nic.in/notice/pay-notice/) website.
To test on your phone, download [Expo Go](https://expo.io/client) ([Android](https://play.google.com/store/apps/details?id=host.exp.exponent) / [iOS](https://itunes.apple.com/app/apple-store/id982107779)) and scan the QR code on [https://expo.io/@vaibhavpandeyvpz/dtp-exploit-poc](https://expo.io/@vaibhavpandeyvpz/dtp-exploit-poc) using your phone camera to run it.
Potential derivatives can also be used to create lookup tables by generating random vehicle numbers in acceptable ranges for each RTO. I have been trying to report this several times since almost a year on various email address(es) but no one has fixed this yet.
Please fix this immediately by simply masking the mobile number on server-side instead of doing it on client-side. This is being exploited in wild since ever to harass people.
---
**EDIT:** (20121/06/02) This is thankfully patched now.