fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Misconfigured Apache Airflow Servers Leak Thousands Of Credentials

Misconfigured Apache Airflow Servers Leak Thousands Of Credentials

While investigating a misconfiguration flaw in Apache Airflow, researchers discovered many exposed instances over the web leaking sensitive information, including credentials, from well-known tech companies.

Apache Airflow is a popular open-source workflow management platform for organizing and managing tasks.

Cloud hosting providers, payment processors leaked credentials

This week, researchers Nicole Fishbein and Ryan Robinson from security firm Intezer have disclosed details on how they identified misconfiguration errors across Apache Airflow servers run by major tech companies.

The misconfiguration flaws resulted in sensitive data leakage including thousands of credentials from popular platforms and services such as Slack, PayPal, and Amazon Web Services (AWS), among others, claim the researchers:

services and platforms leaking creds
Researchers saw commonly used services and platforms leaking credentials (Intezer)

“These unsecured instances expose sensitive information of companies across the media, finance, manufacturing, information technology (IT), biotech, e-commerce, health, energy, cybersecurity, and transportation industries,” says Intezer’s researchers.

Also Read: The Importance of Penetration Testing for Businesses

In various scenarios that researchers have analyzed, the most common reason for credential leak seen on Airflow servers was insecure coding practices.

For example, Intezer’s team discovered various production instances with hard-coded passwords inside the Python DAG code:

production environment credentials leak
 Examples of hardcoded password for a production PostgreSQL database (Intezer)

“Passwords should not be hardcoded and the long names of images and dependencies should be utilized. You will not be protected when using poor coding practices even if you believe the application is firewalled off to the internet,” warn Fishbein and Robinson. 

In another case of misconfiguration, researchers saw Airflow servers with a publicly accessible configuration file: 

“The configuration file (airflow.cfg) is created when Airflow is first started. It contains Airflow’s configuration and it is able to be changed,” state the researchers. The file contains secrets such as passwords and keys.

But, if the `expose_config` option in the file is mistakenly set to ‘True,’ the configuration becomes accessible to anyone via the web server, who can now view these secrets.

publicly visible Airflow config file
Publicly visible Airflow config file ‘airflow.cfg’ (Intezer)

Other examples caught in the wild included sensitive data stored in Airflow “Variables” that could be edited by an unauthorized user to inject malicious code, and the improper use of “Connections” feature—credentials stored in the unencrypted “Extra” field as JSON blobs visible to everyone.

Also Read: Free Privacy Policy Compliance Review

Research demonstrates risks of delayed patching

In addition to identifying improperly configured Airflow assets, the focus of this research was to draw attention to risks that come from delaying software updates.

Intezer states the vast majority of these flaws were identified in servers running Airflow v1.x from 2015, still in use by organizations from different sections.

In version 2 of Airflow, many new security features were introduced including a REST API that requires authentication for all operations. The newer version also doesn’t store sensitive information in logs and forces the administrator to explicitly confirm configuration options, rather than go with default ones.

Exposing customer records and sensitive data due to security flaws resulting from procrastinated patching could be in violation of data protection laws like the GDPR.

“Disruption of clients’ operations through poor cybersecurity practices can also result in legal action such as class action lawsuits,” advises the security firm.

This discovery comes just months after a misconfiguration in Argo Workflows, also discovered by Intezer, was abused by attackers to deploy cryptominers on Kubernetes clusters.

In August this year, BleepingComputer reported on cases of misconfigured buckets exposing millions of sensitive records from a secret terrorist watchlist.

Intezer states that prior to making its findings public it has notified the identified organizations and entities leaking sensitive data via vulnerable Airflow instances.

“In light of the major changes made in version 2, it is strongly recommended to update the version of all Airflow instances to the latest version. Make sure that only authorized users can connect,” advise Intezer’s researchers in their report.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us