How I found a security vulnerability in NASA

Hey Everyone ,

Here’s another example of a vulnerability I found in NASA. This is actually my third bug with them, and honestly, it was a pretty fun one that also gave me a nice takeaway.

I started off by pulling subdomains using Amass. The tool gave me over 30,000 subdomains.

I used HTTPX to filter out the active ones.

To make it easier, I split the results into chunks of 5,000 each like this:

Step 2 — AI Filtering

Here’s where AI really helped. There’s a cool tool that lets you run LLMs directly in your terminal using your Gemini or OpenAI API key.

So I asked the AI to analyze my subdomains and tell me which ones looked interesting, like internal dashboards, DevOps tools, staging environments, etc.

Example command:

The AI did a great job , it pointed out the subdomains most likely to hold sensitive stuff, saving me tons of time. Usually, these are the ones that have misconfigurations, info leaks, or outdated CVEs.

Step 3 — Digging Deeper

From the filtered results, one of the subdomains I got was:

https://mcl-labcas.jpl.nasa.gov/labcas-ui/m/index.html

As always, my first move is checking JavaScript files, because they often reveal hidden endpoints or secrets that people overlook.

I used a little snippet to pull out endpoints from JS files:

But honestly, I prefer manual analysis, so I opened the JS files myself.

Step 4 — The Discovery

I noticed the developers were saving way too much stuff in Local Storage, which is usually a bad idea.

So I checked it out, and boom — there it was.

I found a hidden endpoint:

Visiting that link gave me access to over 1,300 user records from the platform.

Note: This site isn’t public. Regular users can’t even create accounts there, which makes the exposure more critical.

Final Result

I reported the issue, and it was accepted as a P3.

And I Got Letters of Recognition (LOR) Criteria

And I Got Letters of Recognition (LOR) Criteria

Thank you all! I hope you enjoyed the article. If you have any questions, I’m here to help.

Remember My name : everythingBlackkk

Made by ❤

Github : https://github.com/everythingBlackkk

Linkedin : www.linkedin.com/in/everythingblackkk

X : https://x.com/0xblackkk

Youtube : https://www.youtube.com/@everythingBlackkk

Last updated