How I Pwned Telemetry on Amsterdam.nl a Simple JS Scan Landed Me in Amsterdam's Hall of Fame (Swag Pending Lol)

None

Yo whats up peeps, its MRKNIGHT-NIDU here! Today Im spilling the tea on how I nabbed this high sev find on a subdomain of amsterdam.nl, got into their Hall of Fame, and uh… still waiting on that swag. Its been a wild ride, but lemme break it down from the start.

Free link: https://mrknightnidu.medium.com/how-i-pwned-telemetry-on-amsterdam-nl-9d2baf2b3d7f?sk=5414164d76f714a795dd52bec6b11aa3

None

The trigger: That lit Linkedin post

It all popped off when I was doomscrolling on LinkedIn. Saw this post from a researcher who scored some dope swag and Hall of Fame vibes for reporting a bug to amsterdam.nl.I was like, Bet, I want that too! So I jumped into recon on amsterdam.nl domains. Who doesnt love a hunt with potential rewards, no cap?

None

I fired up my private tools to scoop all the subdomains of amsterdam.nl. One by one, I checked em out testing features, looking for sus stuff, but nada at first. Then I hit this interesting subdomain: https://don'tknow.amsterdam.nl/ lol, the names kinda funny now. For the privacy i choose this name!

Didnt see much on the surface, so I dipped into the source code. In the browser console, I check all the JS files and ran a script in console to hunt hidden API keys. Boom yo, I got it: a straight up exposed Instrumentation Key for Azure. The key? fa239857–there-is-not-api-bf76-read-the-blog-bro!. It was chilling in client-side JS, easy pickings.

Me to my self:

None

But but but, just finding a key? Nah, triage teams would close that as informative real quick. So I had to level up, exploit it, and show the impact.

Proving It: Whipping Up the PoC

With this key, anyone could inject fake telemetry without auth. Like, it could:

Mess up logs and metrics

Fake alerts or hide real ones

Junk up dashboards

Help red teams with noise cover

To show it, I made a simple curl PoC to shoot fake data into production:

curl -X POST https://blah-blah-blah-5.in.yo-yo-yo-yo.azure.com/v2/track -H Content-Type: application/json -d {name: Microsoft.ApplicationInsights.Event, time: 2025–07–02T12:34:56.789Z, iKey: fa239857–there-is-not-api-bf76-read-the-blog-bro, data: {baseType: EventData, baseData: {name: Test_Injection, properties: {environment: production, alert: FAKE TELEMETRY INJECTED, author: MRKNIGHT-NIDU}}}}

Response came back like:

{itemsReceived:1,itemsAccepted:1,appId:null,errors:[]}

None

Yo, it worked system ate my fake stuff no questions asked.

None

This proved its exploitable and hits hard on data vibes.

Sev Level and Mapping

I called it HIGH sev:

Exposure: Prod key in JS, out in the open.

Auth: Zero public POST go brr.

Impact: Wrecks logging, alerts, analytics.

Likelihood: Super high browser inspect and done.

Maps to OWASP A6:2021 Vuln Components and logging injection. Kinda like CVE-2021–42306 and other App Insights key dramas.

Reporting and the W

I put together a clean report with poc and sent it via their CVD on Zerocopter on 02/07/2025. Two days later, team hits back triaged as high, accepted! They added me to the Hall of Fame on the municipal info sec site go check it. Policy says maybe a token of appreciation hoping for Amsterdam swag.

None

Hall Of Fame: https://www.informatiebeveiligingsdienst.nl/responsible-disclosure/2025-coordinated-vulnerability-disclosure-hall-of-fame/

None

The Wait Game…

Now its 28/11/2025 almost five months, and I havent got my swag yet. Lol, Im about to cry fr.

None

But the Hall of Fame is fire, and helping secure public stuff feels good. Bug hunting aint just about rewards; its the thrill and impact.

Hope you vibe with my story! If youre hunting, drop your tales below. Amsterdam team, if you see this, swag pls?

None

Stay safe out there!

None