Friday, April 7, 2017

Ask.com exposing real-time user queries to the public

Ask.com’s Apache server status page is open to the public at http://ift.tt/2nKB67D. That technically means that any queries and user actions done on that server on Ask.com are open to anyone to look at.

It is unclear how long this page has been open to the public, but the server status page says the last time this server was restarted was over three days ago. Is it possible that on that reboot, the server status page was accidentally left unlocked and exposed?

All the IP addresses listed are internal IPs, likely the Ask.com firewall. So it is not exposing unique searchers’ IP information. But it is exposing user queries, how many searchers are done, in real time.

Here is a snippet of the exposed log:

You can see that a searcher is looking for a Rolex Submariner watch, a purple leaf sand cherry hedge, Australian securities exchange share prices and more. Clear queries from real searchers are fully exposed here. You can simply keep refreshing the http://ift.tt/2nKB67D page and see new queries from real searchers.

This, on some level, reminds me of the AOL search query leak, where a user’s queries were able to be uncovered and tracked down.

This was discovered by Paul Shaprio less about two hours ago.

The post Ask.com exposing real-time user queries to the public appeared first on Search Engine Land.

No comments:

Post a Comment