Researchers found that unauthorized users could see application logs and metadata without authentication due to a ...