How I was able to find the P4 vulnerability in the United States Department of Agriculture by phone.

Prince Roy(RoyzSec)
2 min readSep 1, 2023

--

Har Har Mahadevđź”±. This is Prince Roy, a cyber security researcher. Last year, I discovered the information disclosure vulnerability on the server of the USDA [United States Department of Agriculture] using my phone.

have you gone mad?

No, guys, for a few reasons, I didn’t publish a blog about it. Now I am going to tell you how I found that issue. I used a Google Dork, which is actually my favourite method to find a vulnerability.

inurl:usda.gov | confidential | “employee only” | proprietary | top secret | classified | trade secret | internal | private | WS_FTP | ws_ftp | log | LOG filetype:log

And then I got some juicy information

juicy information!!!!!

Then I reported it. After 5–6 hours, it got accepted and I was awarded with the HOF:

Accepted → Resolved.

https://bugcrowd.com/usda-vdp/hall-of-fame

Finally, thanks to Aditya Shende sir, my mentor, who always helps me. I hope that you guys may be helped by this small blog, and thanks in advance for investing your crucial time to read it.

Please follow my Social media accounts for further updates:

Linkedin: https://www.linkedin.com/in/prince-roy-4b9a75187/

Twitter: https://twitter.com/royzsec

Github: https://github.com/royzsec

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Prince Roy(RoyzSec)
Prince Roy(RoyzSec)

Written by Prince Roy(RoyzSec)

Cyber Security Researcher | Ex-GPCSSI2021

Responses (2)

Write a response