I tried to signup for TechCrunch Disrupt to pitch our VC funded predictive analytics platform that uses heuristics and ML to find what is driving users to convert and identifies potential changes you can make to your website to drive conversion growth and got a very silly SQL error that showed them inserting my password in plain text!<p>(error code 22001) SQLSTATE[22001]: [Microsoft][ODBC Driver 13 for SQL Server][SQL Server]String or binary data would be truncated. (SQL: insert into [battle_users] ([userEmail], [userPassword], [activationCode], [isFastTrack], [event_id]) values (david@retroanalytics.io, aQojvBPZK9ZXcJw49dK{oeF6GRDm4E)(T4XMQrCN]c,$Vj86470V242wu&mbsCf*;L2Q, 0, 138, ?))<p>Simply enter a long password on https://battlefieldaustralia.techcrunch.com/auth/register to receive the error yourself
Damn, that seems pretty bad. That said, could this be a problem with the Startup Battlefield mini site or do you think it's common practice across TechCrunch as a whole?<p>Part of me cynically thinks the latter, but another part of me thinks a lazy developer could have taken shortcuts with what they saw as a less important part of the site. Either way, it's bad news and I hope they address it soon.
More accurate / precise headline: <i>TechCrunch Startup Battlefield Australia site stores user passwords in plaintext</i><p>At the bottom it says "Powered by Trackiva" which looks to be a splash page service.<p>> Trackiva is the platform that powers the famous TechCrunch Battlefield application selection process.<p>So really it sounds like this splash page service, which looks to be relatively unknown in Google is insecure, making (at least) some of the OWASP Top 10 vulnerabilities.<p>Apparently the app is made by this company Fardini Media (<a href="https://www.fardinimedia.com/" rel="nofollow">https://www.fardinimedia.com/</a>). Hopefully they'll find this thread from a Google Alert or something and fix it.
This website hasn't been updated in a while. <a href="http://plaintextoffenders.com/" rel="nofollow">http://plaintextoffenders.com/</a> Scary how many websites still do that.<p>A website I would've never expected it was <a href="https://www.pm.org/" rel="nofollow">https://www.pm.org/</a>, a community website for Perl developers run by ... well Perl developers. <a href="https://what.thedailywtf.com/topic/1874/perl-mongers/5" rel="nofollow">https://what.thedailywtf.com/topic/1874/perl-mongers/5</a>