Suno.com Security Fiasco: High-Severity Vulnerabilities Exposed!

Security Advisory: Multiple high-severity vulnerabilities have been found in Suno.com, including JWT leakage, IDOR, and DoS. Notably, your session token might be easier to steal than candy from a baby. Suno.com has responded with the speed of a sloth, prompting public disclosure to protect users.

Pro Dashboard

Hot Take:

In a shocking twist of fate, Suno.com seems to have transformed from a web application into a cybercriminal’s paradise, offering a buffet of vulnerabilities for hackers to feast on. If Suno were a piñata, it would be raining down JWT tokens and user data faster than you can say ‘Oops, we did it again!’

Key Points:

  • Multiple high-severity vulnerabilities discovered in Suno.com.
  • Excessive data exposure includes JWT token leakage.
  • Broken object level authorization allows unauthorized data access.
  • Unrestricted resource consumption could lead to denial of service.
  • Vendor’s response was lackluster, leading to public disclosure.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?