Leaked DB credentials on https://██████████.mil/███

Disclosed: 2020-12-03 21:32:20 By al-madjus To deptofdefense
Critical
Vulnerability Details
**Summary:** Information disclosure with login credentials for ms-sql database exposed. **Description:** I've found a PHP info file disclosed on https://█████.mil/██████ containing login credentials for a database cloud server (███████) as well as information on the host system such as hostname, username and full paths. The database server is up, but I have not tried connecting to it with the credentials, as I feel that would be going too far. ## Impact Possible access to database as well as disclosure of sensitive host information. ## Step-by-step Reproduction Instructions 1. Go to https://██████████.mil/████████ 2. Search for 'password', you should see this: `Data Source=tcp:███,█████████;Initial Catalog=██████████;User Id=████@██████████;Password=███████ ` 3. Run `nc -vvv █████████ █████` to confirm database is running and service ms-sql-s is accepting connections: `(UNKNOWN) [███████] ████████ (ms-sql-s) open ^C sent 0, rcvd 0 ` ## Product, Version, and Configuration (If applicable) ## Suggested Mitigation/Remediation Actions ███████ should not be available on the server. ## Impact Possible access to database as well as disclosure of sensitive host information.
Actions
View on HackerOne
Report Stats
  • Report ID: 761790
  • State: Closed
  • Substate: resolved
  • Upvotes: 42
Share this report