During the interview we were working on a feature and I noticed what appeared to be a session fixation vulnerability where - and I kid you not - the session ID is the user’s email.
The product allows you to upload/download files to the user’s account.
I pointed it out to the engineer and the response was that it “was fine” because _they_ only cared about certain files and if other stuff ended up there it didn’t matter. I pointed out you’d be able to also _read_ any files (which are sensitive reports) and was told “you’d have to know the file name to download them.”
The file names are trivial to guess given you are familiar with the site.
While this isn’t a feature that could be exploited to take over a host, it could allow free file hosting, huge costs (if one kept uploading large files), and a potential data breach of sensitive customer information.
I am _not_ a security research or a colored hat wearer of any sort.
What would you do in this scenario?