Loading HuntDB...

JumpCloud API Key leaked via Open Github Repository.

Critical
S
Starbucks
Submitted None

Team Summary

Official summary from Starbucks

vinothkumar discovered a publicly available Github repository containing a Starbucks JumpCloud API Key which provided access to internal system information. @vinothkumar — thank you for reporting this vulnerability and confirming the resolution.

Reported by vinothkumar

Vulnerability Details

Technical details and impact analysis

Use of Hard-coded Credentials
**Summary:** Open Github Repo Leaking Starbucks JumbCloud API Key **Description:** Team, While going through Github search I discovered a public repository which contains Jumbcloud API Key of Starbucks. Repo: [https://github.com/██████████/Project](https://github.com/██████████/Project). File: [https://github.com/████/Project/blob/0d56bb910923da2fbee95971778923f734a25f68/getSystemUsers.go](https://github.com/████/Project/blob/0d56bb910923da2fbee95971778923f734a25f68/getSystemUsers.go) ``` req.Header.Add("x-api-key", "████████") ``` **POC** * List systems ``` curl -H "x-api-key: ████████" "https://console.jumpcloud.com/api/systems" ``` There are multiple AWS instances present * ``` curl -H "x-api-key: █████" "https://console.jumpcloud.com/api/systemusers" ``` * SSO Applications ```curl -H "x-api-key: ██████" "https://console.jumpcloud.com/api/applications" ``` AWS login SAM config is presents. This would leads to AWS account takeover ## Impact This issue impact is critical as through this API anyone could * Execute commands on systems [https://docs.jumpcloud.com/1.0/commands/create-a-command](https://docs.jumpcloud.com/1.0/commands/create-a-command) * Add/Remove users which has access to internal systems * AWS Account Takeover

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Use of Hard-coded Credentials