Security

CSO

Don't be like these 900+ websites and expose millions of passwords via Firebase

Warning: Poorly configured Google Cloud databases spill billing info, plaintext credentials


At least 900 websites built with Google's Firebase, a cloud database, have been misconfigured, leaving credentials, personal info, and other sensitive data inadvertently exposed to the public internet, according to security researchers.

Among these websites, it's estimated that at least 125 million user records were found to be publicly accessible, including billing information and plaintext passwords. In short: If you're using Google's Firebase, make sure it's securely configured to avoid leaking private info to the rest of the world.

Firebase is a popular backend service that websites and apps use for storing data in the cloud. It provides security rules to keep data safe, in theory anyway.

In practice, we recall an incident where 24,000 Android apps exposed data through ham-handed Firebase implementations. According to one software engineer who used to work at Google and as a Firebase consultant, "the concerns with security rules have always plagued the product."

That developer did not immediately respond to a request for further comment, nor did Google.

The penetration testers, who go by the names mrbruh, xyzeva and logykk, previously identified exposed credentials in AI hiring service chattr's Firebase implementation. They found a way to use Firebase's registration feature to create a new user with administrative read and write privileges.

Following that dumpster fire, the cyber-trio decided to conduct an internet-wide search for poorly configured Firebase databases using a scanning program converted from Python into Go to tame a memory leak.

The renovated code took between two and three weeks to scour 5.2 million domains, and ultimately ended up with a list of data obtainable from more than 900 websites.

All told, the list included almost 125 million records, with 85 million names, 106 million email addresses, 34 million phone numbers, 20 million passwords, and 27 million billing details.

The researchers, who note that the actual numbers are probably larger, say they spent two weeks sending email notifications to 842 of the websites, of which 85 percent got through and nine percent bounced.

From this, they say 24 percent of site owners fixed the misconfiguration, though just one percent of site owners mailed back and a mere 0.2 percent of site owners – just two of them – offered some form of bug bounty.

Configuration mishaps of this sort were common for many years with AWS, until AWS decided it would help customers avoid shooting themselves in the foot through more secure default settings.

It's still an issue, however. According to OWASP, security misconfiguration ranks fifth among the top ten most common vulnerabilities, with an average incidence rate of 4.51 percent. ®

Send us news
11 Comments

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Brit watchdog probes Google's search, ads empire

Third front opened amid continued scrutiny from US, Euro regulators

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Google and Linux Foundation form Chromium love club

Right as Uncle Sam pushes for Chrome sell-off, eh?

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet

Google reports halving code migration time with AI help

Chocolate Factory slurps own dogfood, sheds drudgery in specific areas

Tired of begging, Microsoft now trying to trick users into thinking Bing is Google

If you can't beat 'em, just imitate their branding, hide yours and hope they don't notice

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys