How I used a simple Google query to mine passwords from dozens of public Trello boards

How I used a simple Google query to mine passwords from dozens of public Trello boards
0

#1

Written by Kushagra.

A few days ago, while researching, I found that a lot of individuals and companies are putting their sensitive information on their public Trello boards. Information like unfixed bugs and security vulnerabilities, the credentials of their social media accounts, email accounts, server and admin dashboards — you name it. It’s all available, and the info is being indexed by all the search engines so that anyone can easily find it.

How did I discover this?

I searched for Jira instances of companies running Bug Bounty Programs with the following search query:

inurl:jira AND intitle:login AND inurl:[company_name]
Note: I used a Google dork query, sometimes referred to as a dork. It is a search string that uses advanced search operators to find information that is not readily available on a website. — WhatIs.com

I entered Trello in place of [company name]. Google presented a few results on Trello Boards. Their visibility was set to Public, and they displayed login details to some Jira instances. It was around 8:19 AM, UTC.

I was so shocked and amazed 😲

So why was this a problem? Well, Trello is an online tool for managing projects and personal tasks. And it has Boards which are used to manage those projects and tasks. The user can set the visibility of their boards to Private or Public.

After finding this flaw, I thought — why not check for other security issues like email account credentials?

I went on to modify my search query to focus on Trello Boards containing the passwords for Gmail accounts.

inurl:https://trello.com AND intext:@gmail.com AND intext:password

And what about SSH and FTP?

inurl:https://trello.com AND intext:ftp AND intext:password
inurl:https://trello.com AND intext:ssh AND intext:password

🔎 What else I found

After spending a few hours using this technique, I uncovered more disturbing weaknesses. And I kept on changing my search query.

Some companies use Public Trello boards to manage bugs and security vulnerabilities found in their applications and websites.

People also use Public Trello boards as a fancy public password manager for their organization’s credentials.

Some examples included the server, CMS, CRM, business emails, social media accounts, website analytics, Stripe, AdWords accounts, and much more.

Examples of public Trello boards which contain sensitive credentials

Here’s another example:

An NGO sharing login details to their Donor Management Software (database) which contained a lot of PII (personally identifiable information), and details like donor and financial records

Until then I was not focusing on any specific company or Bug Bounty Programs.

But nine hours after I discovered this Trello vulnerability, I had found the contact details of almost 25 companies that were leaking some very sensitive information. So I reported them. Finding contact details for some of them was a tedious and challenging task.

I posted about this in a private Slack of bug bounty hunters and a infosec Discord server. I also tweeted about this right after discovering the Trello technique. The people there were as amazed and astonished as I was.

Then people started telling me that they were finding cool things like business emails, Jira credentials, and sensitive internal information of Bug Bounty Programs through the Trello technique I shared.

Almost 10 hours after discovering this Trello technique, I started testing companies running Bug Bounty Programs specifically. I then began with checking a well-known ridesharing company using the search query.

inurl:https://trello.com AND intext:[company_name]

I instantly found a Trello board that contained login details of an emplyee’s business email account, and another that contained some internal information.

To verify this, I contacted someone from their Security Team. They said they had received reports about those flaws right before they had received mine. But the security team asked me to submit a complete report to them anyway, because it was a new issue.

Unfortunately, my report got closed as a Duplicate. The ridesharing company later found out that they had already had received a report about the specific instances I reported.

In the coming days, I reported issues to 15 more companies about their Trello boards that were leaking highly sensitive information about their organizations. Some were big companies, but many don’t run a Bug Bounty Program.

One of the 15 companies was running a Bug Bounty Program, however, so I reported to them through it. Unfortunately, they didn’t reward me because it was an issue for which they currently don’t pay. 🤷

Thanks for reading my story. You can try the Trello technique out for yourself.

If you liked this article, give me some claps 👏

And you can follow me on Twitter ✌️

Kushagra (@xKushagra) | Twitter

I’d like to thank CyberSecStu and Toffee for helping me proofread and edit this article.


How I used a simple Google query to mine passwords from dozens of public Trello boards was originally published in freeCodeCamp on Medium.


#2

It should be noted that making your trello page private does not improve your security for a while as the username and passwords are still cached by Google and visible on the search page changing your password is the only way to secure such an account


#3

Very interesting! I’m going to try it to prove if it really works.


#4

This is very useful information for me. Thank you very much for the link!


#5

Many thanks for this post, this is what I need, I will definitely try. I will definitely share this article with colleagues from WritePaperFor-me .