Task Description
To: Alwaysdata IT Security Team From: Raden Adhiyaksa Indiharto Date: June 9, 2025 Vulnerability: Sensitive Data Exposure
Dear Alwaysdata Security Team,
I hope this message finds you well. I am reaching out to responsibly disclose a security issue I have identified within your infrastructure that may pose a risk to your services and your users.
Vulnerability Summary During passive reconnaissance of your publicly accessible infrastructure, I discovered multiple sensitive API keys and service credentials exposed in plaintext, including: 1. Twilio ACCOUNT_SID and APP_SID values 2. Heroku API keys 3. Amazon AWS S3 bucket URLs
These secrets were found in a file named secret.txt on your domain (alwaysdata.com). The exposed credentials could potentially allow unauthorized access to third-party services, leakage of customer data, or resource abuse.
Steps to Reproduce 1. Access the Alwaysdata public directory. 2. Locate the file named secret.txt. 3. Run the following commands to filter sensitive credentials:
cat secret.txt | grep Heroku
cat secret.txt | grep twilio
cat secret.txt | grep aws
4. This revealed a number of API keys and identifiers, as shown in the screenshots I have attached to this report.
Suggested Remediation 1. Immediately remove the publicly exposed file or restrict access to it. 2. Revoke and rotate all exposed API keys (Twilio, Heroku, AWS, etc.). 3. Conduct an internal audit to ensure no unauthorized access has occurred using these credentials. 4. Consider implementing secret scanning tools in your CI/CD pipelines to prevent future exposures.
Additional Note At this point, no further exploitation has been carried out, and no services have been interacted with using the exposed credentials. However, if you require a deeper assessment or verification of the actual impact and exploitability, I am open to performing controlled testing with your permission.
Please advise if the investigation should stop at this discovery phase, or if you would like me to assist further in validating the scope of the exposure.
Disclosure Policy This report has not been shared publicly. I am committed to responsible disclosure and will not publish or use this information in any way that may harm your services or users. Please let me know if you need any further details or assistance in mitigating this issue.
Thank you for your attention, and I look forward to your response.
Kind regards, Raden Adhiyaksa Indiharto
email: radenadhiyaksa89@gmail.com
Link Video, Image, and File PoC https://drive.google.com/drive/folders/1pTvtlZmsxj9LIhyAwNnDN5ZRqGnweZs3?usp=sharing
|