Task Description
Overview: While conducting research on alwaysdata.com, I discovered sensitive credentials publicly exposed on a Telegram channel. These credentials provided direct access to alwaysdata’s phpMyAdmin instance, exposing database management functionalities that could lead to unauthorized data access, modification, or deletion. This issue represents a serious security risk, as it could enable malicious actors to compromise databases hosted on alwaysdata.
Steps to Reproduce: 1. Navigate to [https://phpmyadmin.alwaysdata.com/](https://phpmyadmin.alwaysdata.com/). 2. Use the following credentials found on the Telegram channel:
Username: projets_baltic
Password: LouisCelestin004@#
3. Successfully logging in grants full access to phpMyAdmin.
Proof of Concept (PoC):
![PoC](https://imgur.com/NZ33jM2.png)
Impact: - Unrestricted access to phpMyAdmin allows any user to view, edit, or delete data within the accessible databases. - Potential exposure of sensitive customer or internal data, which could result in data breaches. - Elevates the risk of unauthorized database modifications, compromising data integrity and system security.
Remediation Suggestions: - Immediately change the credentials for the affected phpMyAdmin user accounts and review logs for any unauthorized access. - Implement IP or role-based access restrictions to phpMyAdmin to prevent unauthorized external access. - Monitor and periodically audit for publicly shared or leaked credentials, especially on social media and messaging platforms.
Motivation for Reporting: This report highlights the potential for data compromise on alwaysdata’s phpMyAdmin, as exposed credentials grant full access to manage sensitive databases. Addressing this issue will help alwaysdata protect its customers’ data and maintain the integrity of its hosted environments.
References: - [OWASP Secure Credential Storage](https://owasp.org/www-project-proactive-controls/v3/en/c8-protect-data-everywhere) - [NIST Guidelines on Access Control](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final)
Please feel free to reach out if additional details or verification are required.
|