LeakIX blogBlog

cat < /dev/mind > /dev/stdout

BanqueAtlantique.net, what your config reveals

When you ask for config files nicely …

… you might as well get some!

The server got indexed the first time by our system the 8th of August 2020, with the content of the leak leaving now doubt about its origin :

LeakIX results

The reports and leaks are visible to the reporting team only considering their risk, the detail page will however mention the leaks and reports count.

Problem

The culprit here, is a left over /.env file revealing information about the infrastructure, and its credentials.

$ curl 'http://154.68.41.73/.env'
APP_NAME=Banque-Atlantique
APP_ENV=production
APP_KEY=base64:<redacted>
APP_DEBUG=false
APP_URL=http://satis-abi.<redacted>/

LOG_CHANNEL=stack


LDAP_SCHEMA=ActiveDirectory
LDAP_HOSTS=192.168.<redacted>
LDAP_BASE_DN=ou=banqueatlantique,dc=banqueatlantique,dc=group
LDAP_USER_ATTRIBUTE=<redacted>
LDAP_USER_FORMAT=<redacted>=%s,ou=banqueatlantique,dc=banqueatlantique,dc=group
LDAP_CONNECTION=default
LDAP_USERNAME=[email protected]<redacted>
LDAP_PASSWORD=<redacted>

#LDAP_HOSTS2=<redacted>
#LDAP_BASE_DN2=ou=dmdtest,dc=dmd,dc=com
#[email protected]
#LDAP_PASSWORD2=<redacted>

#DB_CONNECTION=mysql
#DB_HOST=127.0.0.1
#DB_PORT=3306
#DB_DATABASE=abi
#DB_USERNAME=root
#DB_PASSWORD=null

BROADCAST_DRIVER=log
CACHE_DRIVER=file
QUEUE_CONNECTION=sync
SESSION_DRIVER=file
SESSION_LIFETIME=120

REDIS_HOST=127.0.0.1
REDIS_PASSWORD=null
REDIS_PORT=6379

MAIL_DRIVER=smtp
MAIL_HOST=10.<redacted>
MAIL_PORT=25
MAIL_USERNAME=[email protected]
MAIL_PASSWORD=<redacted>
MAIL_ENCRYPTION=

AWS_ACCESS_KEY_ID=
AWS_SECRET_ACCESS_KEY=
AWS_DEFAULT_REGION=us-east-1
AWS_BUCKET=

PUSHER_APP_ID=
PUSHER_APP_KEY=
PUSHER_APP_SECRET=
PUSHER_APP_CLUSTER=mt1

MIX_PUSHER_APP_KEY="${PUSHER_APP_KEY}"
MIX_PUSHER_APP_CLUSTER="${PUSHER_APP_CLUSTER}"

SESSION_DRIVER=file
SESSION_DOMAIN=
JWT_SECRET=<redacted>


ADMIN_MAIL_ADDRESS=<redacted>

As you can see multiple credentials are leaking :

  • LDAP credentials -> useful for all sort of internal applications to test against
  • SMTP credentials -> useful for customer data mining and possibly scamming
  • App key -> Could be used to forge requests to the application or predict cryptographic events

Disclosure

Notification and disclosure to the mentioned tech emails and support team would be fired on the 14th of August 2020, 6 days after index :

Disclosure

The issue would be resolved quickly after contacting them, although no reply nor disclosure has been provided by the company.

End word

There’s a substantial amount of .env files in our index, you can check it for yourself.

Tip: You’ll have to login to consult this specific plugin’s details and data on the host detail page.

Well that’s all we have for today. There’s … still … plenty more in the backlog. Stay tuned!


Share