Loading HuntDB...

Completed Compromise & Source Code Disclosure via Exposed Jenkins Dashboard at https://jenkins101.udemy.com

High
U
Udemy
Submitted None
Reported by cha5m

Vulnerability Details

Technical details and impact analysis

Code Injection
Howdy, @udemy! Summary: ======= I am writing to inform you of a critical information disclosure bug via an exposed Jenkins dashboard located at https://jenkins101.udemy.com. Upon navigating to this address, I was asked to authenticate with my Github account. After authenticating, I was surprised to find that I had complete access to the corresponding Jenkins Dashboard as seen in the screenshot below: {F134658} Impact: ===== Contained within these files was the complete Udemy Django source code. This included complete database schemas and keys/ credentials for the following services: * Crowdin * Amazon Redshift * Exchange * Facebook * Google * Maxmind * Sendgrid * Sift * Twilio * Zencoder * Level3 * Apple * Salesforce * Celery * Paypal * Stripe * Freshdesk * and more To verify that these credentials were active, I attempted to login into Sendgrid. I was able to take over the Udemy Sendgrid account as seen in the screenshot below. I did not make any change/ access any information. {F134656} Mitigation ===== Mitigation for this should be fairly straightforward, simply ensuring proper user authentication should prevent future unauthorized users from access the dashboard. I am not storing any of the informaiton that I came across, however, rekeying the compromised systems may not be a bad idea. I hope this reports helps! Please let me know if you have any questions! 😁 Best, @n0rb3r7

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection