News

Insomnia Cookies exposes database passwords, then quietly fixes the leak

American bakery company sweetly remembered for its late-night warm cookie trucks across college campuses was caught leaking sensitive data on its website.

The data exposed via public .env files included production server database credentials, including the DB server addresses, ports, usernames, passwords, and API keys.

.env files contain sensitive configuration data such as environment variables, API keys, passwords, and are supposed to remain private, hidden from prying eyes of the public.

The exposed .env file provided enough information for an attacker to potentially be able to access the Insomnia Cookies database and carry all sorts of attacks, such as dropping entire databases, or illicitly obtaining the information contained within them, such as customer data.

Source: Bob Diachenko

Bob Diachenko, Cyber Threat Intelligence researcher who discovered the flaw on November 12th via public IoT search engines (such as Shodan), responsibly reported it to Insomnia Cookies.

However, Diachenko didn’t receive a response. And it seems, Insomnia Cookies quietly patched the flaw following Diachenko’s report.

“Insomnia Cookies left almost all of their prod credentials exposed via publicly accessible dot-env file on one of its IPs (indexed by all IoT search engines). Silently secured after responsible disclosure, no response,” tweeted Diachenko.

Diachenko told Security Report he had discovered the data leak last week via public IoT search engines and immediately reported it to Insomnia Cookies:

“I discovered that one on Nov 12th and immediately sent alert to IC.”

“Basically, dot-env is environment variables file for internal usage only. Developers define here settings for databases and endpoints so if you have this, most of the company’s infrastructure is compromised,” Diachenko told Security Report.

When building and publishing websites to production environment, it may be wise to check file permissions, to prevent data leaks such as this one.

Security Report has reached out to Insomnia Cookies for comment but haven’t heard back yet.

Ax Sharma

Ax Sharma is a Security Researcher and Tech Reporter. His works and expert analyses have frequently been featured by leading media outlets including the BBC, Business Insider, Fortune, TechCrunch, TechRepublic, The Register, WIRED, among others. Ax's expertise lies in vulnerability research, malware analysis and reverse engineering, open source software and scams investigations. He's an active community member of British Association of Journalists (BAJ) and Canadian Association of Journalists (CAJ).

Recent Posts

Sea Turtle Cyber Espionage Campaign Targets Telecommunication and IT Companies in the Netherlands

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…

4 months ago

Rogue WordPress plugin: Threat hunters uncover credit card skimming campaign targeting e-commerce sites

Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…

4 months ago

Albanian Parliament and telco ‘One Albania’ suffer cyber attacks

The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…

4 months ago

Carbanak Banking Malware Resurfaces with Updated Tactics in Ransomware Attacks

The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…

4 months ago

Theme park giant Parques Reunidos hit by a ransomware cyber attack

One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…

1 year ago

Phishing kit screenshots your email domain on the fly to appear real

Phishing kit used by multiple hacked sites generates a log in page on the fly…

1 year ago

This website uses cookies.