Hacker took down all the source code of Vine

Twitter needed about five minutes to determine a critical security gap that allowed an attacker to download the entire Vine source code from its servers.

Security researcher Avicoder is the one who discovered this security gap and reported it on Twitter on 31 March.
hacker Comes
The υπήρχε στον Docker που by Twitter staff to curate Vine content.

Docker is an open platform for image management and application management in general. It can also be used to create OS images for laptops, VMs or cloud servers

Typically, Docker installations are not accessible to the public because of the sensitive nature of the content they manage.
But as the Twitter Docker seems to be exposed, something that allowed Avicoder to deal with him.

At first glance it discovered that Twitter was not running the latest version of Docker (v2), but an older API, in version 1. Leveraging it documentation of the Docker API v1, Avicoder started trying all the commands it could find, figuring out what actions it could perform.

He discovered that some commands enabled him to search and retrieve content from the Twitter Docker settings.

So the researcher discovered and downloaded over 80 server images from the of Docker on Twitter.

He then installed several of these OS images on his laptop using a local Docker client and found one of these server images contained the entire Vine source code.

"I was able to see the entire Vine source code, API keys and third-party keys," says Avicoder.

The researcher made his findings on Twitter and five minutes later, Docker's installation was corrected. The company will reward the researcher with 10.080 dollars.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).