Open SonarQube instance leaking internal source code
Critical
E
Equifax-vdp
Submitted None
Actions:
Reported by
aksquare
Vulnerability Details
Technical details and impact analysis
# Summary
I came across an open SonarQube instance which can be found here: http://34.238.92.229:9000/
In this, there are 10 projects with a total of around 100k lines of code
To identify the owner, I went to the Issues tab and expanded the list of authors. There were 29 people there, and many of them were Equifax employees (I reached this conclusion because they have @equifax.com email id).
Some of the projects there in the instance are related to authentication and APIs. One of the largest projects there is called zoomv2
Owing to the sensitive nature of the leakage, I did not dig deeper through the source code, however, I believe that this much information is enough for a POC. However, if you need more information, then I will be happy to dig through the source code there and give specific examples of how the information can be misused.
# Steps to recreate:
1. Go to http://34.238.92.229:9000/
2. There you can click on the issues tab, and then on the bottom left corner, click on Author
3. You will see a list of people who have contributed to the projects and can confirm that many of the people are Equifax employees
4. Go to Projects tab and see all the projects and their source code that are leaked
# Fix
Put the instance behind a login screen, and check if unauthorised users have accessed this instance. If possible revoke access to any API keys or other credentials that were exposed in this instance
*I understand that there were other people from other companies in this instance too, and that this might not be an instance owned by Equifax. However, even though Equifax was not the owner, it still is involved with this particular instance, and thus I decided to report it to you.
## Impact
SonarQube is used to automate finding issues and vulnerabilities in source code. By leaving this instance open, an attacker can get access to all the source code, the issues, and the vulnerabilities that the particular code has. If this code is in a production environment, then this information is extremely dangerous. And even if the project is not in production, this kind of information can have internal APIs, IPs and other sensitive data that can be taken advantage of in other ways.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Disclosure