Exposed valid AWS, Mysql, Sendgrid and other secrets
Critical
G
Glovo
Submitted None
Actions:
Reported by
mehdisadir
Vulnerability Details
Technical details and impact analysis
## Summary:
Hi team,
I just discovered some hardcoded credentials allowing access to AWS, Mysql database, ...
To make this report short, here is the POC:
see ███ & █████
## Steps To Reproduce:
where there are the info :
<p>
APP_NAME=Glovo
APP_ENV=local
APP_KEY=█████
APP_DEBUG=false
APP_URL=http://localhost
LOG_CHANNEL=stack
LOG_LEVEL=debug
DB_CONNECTION=mysql
DB_HOST=██████████
DB_PORT=3306
DB_DATABASE=████████
DB_USERNAME=█████
DB_PASSWORD=█████████
BROADCAST_DRIVER=log
CACHE_DRIVER=file
QUEUE_CONNECTION=sync
SESSION_DRIVER=file
SESSION_LIFETIME=120
MEMCACHED_HOST=127.0.0.1
REDIS_HOST=█████
REDIS_PASSWORD=██████████
REDIS_PORT=11773
MAIL_MAILER=smtp
MAIL_HOST=mailhog
MAIL_PORT=1025
MAIL_USERNAME=null
MAIL_PASSWORD=null
MAIL_ENCRYPTION=null
MAIL_FROM_ADDRESS=null
MAIL_FROM_NAME="${APP_NAME}"
AWS_ACCESS_KEY_ID=███
AWS_SECRET_ACCESS_KEY=███████
AWS_DEFAULT_REGION=eu-central-1
AWS_BUCKET=glovos3
PUSHER_APP_ID=
PUSHER_APP_KEY=
PUSHER_APP_SECRET=
PUSHER_APP_CLUSTER=mt1
MIX_PUSHER_APP_KEY="${PUSHER_APP_KEY}"
MIX_PUSHER_APP_CLUSTER="${PUSHER_APP_CLUSTER}"
SENDGRID_API_KEY=████
[email protected]
[email protected]
REDIS_URL=█████
LINK_RECEIPT=https://glovo.onlineservice.io/g/c/
SENDGRID_TEMPLATE=d-6ae3f2fe536c41fda21ad60a18c10cce
SENDGRID_PUBLIC_KEY=███████
</p>
1. The leak was found using Leakix : https://leakix.net/host/16.170.179.191
#Mitigation :
Remove the exposed credentials and revoke them.
Regards,
NB: After checking some files which i deleted immediatly, I found the company name is GLOVOAPPRO SRL and im not sure if it is related to Glovo company, but I can confirm a little bit from the database where I could see delivery fees ... which is about Glovo's principal service (delivery).
## Impact
Anyone could access
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Use of Hard-coded Credentials