PhotoPrism Configuration&Data Exposure Scanner

This scanner detects the use of PhotoPrism Exposure in digital assets. PhotoPrism instances running in public mode can expose photos, albums, GPS locations, and server configurations to unauthenticated users. The scanner helps identify these vulnerable instances to prevent unauthorized access.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

23 days 21 hours

Scan only one

URL

Toolbox

PhotoPrism is an image management and sharing platform widely used by photographers, digital content creators, and organizations to maintain their digital photo libraries. It can be used to organize, tag, and search for images with ease, making it a powerful tool for managing large collections of photos. The software offers features like face recognition, geolocation of images, and tagging to help streamline photo management tasks. Due to its capabilities, PhotoPrism is often deployed on personal or public servers where users need efficient access to a well-organized photo library. It serves not only individuals with large photo collections but also companies that require a structured and accessible image repository for collaborative use. However, its powerful features can also introduce potential vulnerabilities if not properly configured and managed.

This scanner detects a significant exposure vulnerability in PhotoPrism, which occurs when the application is configured to run in "public" mode. When authentication is disabled, sensitive data such as personal photos, albums, GPS locations, face recognition data, and server configuration details are exposed to the internet without any form of access control. This can lead to unauthorized users accessing the sensitive content stored in PhotoPrism instances. The lack of authentication turns these features into points of vulnerability, exposing users' personal information to potential misuse. Such an exposure can be detrimental, particularly if the photos include sensitive or private details.

The vulnerability related to PhotoPrism's unauthenticated exposure arises from a misconfigured authentication setting where the application runs in public mode without requiring user authentication. The scanner specifically looks for evidence of public access by targeting endpoints and checking responses indicating the 'public' authentication mode. This includes detecting the presence of specific keywords such as "PhotoPrism" and specific JSON markers within server responses that denote public authentication modes. The scanner matches these conditions to confirm the presence of the vulnerability and categorizes the instance as potentially exposed.

If such a misconfiguration is exploited by malicious actors, it can lead to unauthorized access and dissemination of personal data. Hackers could potentially leverage the accessible information to carry out further attacks, such as identity theft or blackmail, using sensitive images and data. Corporate galleries could see proprietary information exposed, and sensitive location data associated with images could also be misused. Therefore, misconfigured PhotoPrism instances pose a risk not only to individual privacy but can have broader implications if they host sensitive or confidential data.

REFERENCES

Get started to protecting your digital assets