Full Disclosure mailing list archives
Re: Public VCS security issues
From: Ronald <mini.pelle () gmail com>
Date: Thu, 27 Mar 2014 00:03:09 +0100
beautiful list of blank passwords for unused applications. On Wed, Mar 26, 2014 at 7:01 PM, Jeremy Voorhis <jvoorhis () gmail com> wrote:
There are lots of AWS credentials out there as well: https://github.com/search?q=AKIAJ&type=Code&ref=searchresults On Wed, Mar 26, 2014 at 8:18 AM, Patrik asd <patrik.grinsvall () gmail comwrote:Probably old but still an issue: https://github.com/search?q=mysql.binero.se&ref=cmdform&type=Code The first hit gives you access to phpmyadmin. There are TONS of credentials pushed to public repositories. This query gives 57k results:https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresultsIt's easy to prevent from a developers perspective, but still - there are probably hundreds of thousands of database or other credentials pushed to public repos. _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/-- Jeremy Voorhis _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
_______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Public VCS security issues Patrik asd (Mar 26)
- Re: Public VCS security issues Ron (Mar 26)
- Re: Public VCS security issues Jeremy Voorhis (Mar 26)
- Re: Public VCS security issues Ronald (Mar 26)
- Re: Public VCS security issues Lorenz Diener (Mar 26)