TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

I pwned half of America's fast food chains simultaneously

1081 pointsby MrBruhover 1 year ago

43 comments

cedwsover 1 year ago
It&#x27;s not clear if the author was hired to do this pentest or is a guerilla&#x2F;good samaritan. If it is indeed the latter, I wonder how they are so brazen about it. Does chattr.ai have a responsible disclosure policy?<p>In my eyes people should be free to pentest whatever as long as there is no intent to cause harm and any findings are reported. Sadly, many companies will freak out and get the law involved, even if you are a good samaritan.
评论 #38935430 未加载
评论 #38935448 未加载
评论 #38935508 未加载
评论 #38936429 未加载
评论 #38938001 未加载
评论 #38941102 未加载
KTibowover 1 year ago
The timeline omits when the article was put online
评论 #38935109 未加载
评论 #38935209 未加载
评论 #38934928 未加载
thekombustorover 1 year ago
At the time of writing, accessing the link returns a bunch of prometheus metrics... interesting.
评论 #38936457 未加载
yieldcrvover 1 year ago
does this count as authorized access under CFAA?<p>I’m curious what the limits are
ysofunnyover 1 year ago
then again, the people in potential harm&#x27;s way seem to be the poor sods trying to get hired by these companies for a meager hourly wage<p>I don&#x27;t see how this &quot;p0wns&quot; the companies themselves
sampliover 1 year ago
If you view this page in Safari, it’s just a text document
评论 #38936448 未加载
评论 #38936912 未加载
评论 #38938721 未加载
hazeboothover 1 year ago
i love the picture of your cat on the home page :)
评论 #38935217 未加载
Aurornisover 1 year ago
&gt; Timeline (DD&#x2F;MM)<p>&gt; 06&#x2F;01 - Vulnerability Discovered<p>&gt; 09&#x2F;01 - Write-up completed &amp; Emailed to them<p>&gt; 10&#x2F;01 - Vulnerability patched<p>Note those dates are DAY-MONTH. At least they patched it within a single day.<p>I find it funny that the author found a massive vulnerability but chose to wait a couple days to report it so they could finish a nice write-up.<p>Reminds me of my experience with HackerOne: We had some participants who would find a small vulnerability, but then sit on it for months while they tried to find a way to turn it into a larger vulnerability to claim a higher prize.<p>Then when they finally gave up on further escalation and submitted it, they&#x27;d get angry when we informed them that we had already patched it (and therefore would not pay them). The incentives in infosec are weird.
评论 #38936225 未加载
评论 #38937103 未加载
评论 #38936425 未加载
评论 #38936217 未加载
评论 #38937615 未加载
评论 #38936798 未加载
评论 #38937780 未加载
评论 #38937950 未加载
评论 #38937203 未加载
评论 #38937930 未加载
评论 #38937565 未加载
评论 #38937007 未加载
评论 #38937114 未加载
评论 #38940917 未加载
评论 #38937485 未加载
评论 #38937988 未加载
评论 #38936392 未加载
lulznewsover 1 year ago
&gt;With an upbeat pling my console alerted me that my script had finished running<p>Forget the pwn how do I do this<p>Also, HN used to think this was cool now there are 20 posts blaming the hacker…
评论 #38938441 未加载
评论 #38938635 未加载
评论 #38938765 未加载
评论 #38938085 未加载
评论 #38939168 未加载
评论 #38939790 未加载
评论 #38938693 未加载
评论 #38939312 未加载
评论 #38938480 未加载
评论 #38938349 未加载
评论 #38938911 未加载
评论 #38939054 未加载
评论 #38939720 未加载
counterpartyrskover 1 year ago
This is the most perfect blog post. ZERO fluff, straight to the point. Win.
评论 #38937556 未加载
评论 #38937995 未加载
MattDaEskimoover 1 year ago
Full permissions for a user is blatant negligence.<p>For anyone who&#x27;s never used Firebase before this is as simple as a single piece of logic that appears basically as:<p>if authUserID is UserDirectoryID<p>That simple.
评论 #38935098 未加载
评论 #38935103 未加载
评论 #38937997 未加载
intern4tionalover 1 year ago
This isn’t owning fast food chains; rather compromising some AI startup that has some of them as a customer.<p>Title is misleading.
评论 #38934941 未加载
评论 #38934985 未加载
评论 #38934869 未加载
评论 #38935226 未加载
评论 #38935077 未加载
bikamonkiover 1 year ago
You are a good human. Seems they had not tweaked the database rules correctly, maybe even left the default setup! That means you could have executed this:<p>Firebase.database().ref(&#x27;&#x2F;&#x27;).set(&#x27;All your data is gone&#x27;).<p>Better yet, download the whole DB and then:<p>Firebase.database().ref(&#x27;&#x2F;&#x27;).set(&#x27;I have all your data, pay me to get it back&#x27;).
评论 #38939728 未加载
mellosoulsover 1 year ago
<i>No contact or thanks has been received back so far</i> :)
评论 #38934871 未加载
评论 #38934790 未加载
评论 #38934913 未加载
评论 #38935228 未加载
j-bosover 1 year ago
If this had been exploited and the job applicants to Target, Subway, Dunkin et al, had bank&#x2F;credit fraud committed in their name&#x27;s, would the big companies be liable for not performing due dilligence on chatter.ai? To be clear, I&#x27;m asking from a legal standpoint not a practical one.
评论 #38935256 未加载
评论 #38938903 未加载
评论 #38934993 未加载
评论 #38939365 未加载
评论 #38937344 未加载
pstuartover 1 year ago
I was looking at jobs for my son at Safeway supermarkets and lazily put <a href="https:&#x2F;&#x2F;www.safeway.com&#x2F;jobs" rel="nofollow">https:&#x2F;&#x2F;www.safeway.com&#x2F;jobs</a> in the browser.<p>That redirects to <a href="https:&#x2F;&#x2F;www.careersatsafeway.com&#x2F;desktop&#x2F;home" rel="nofollow">https:&#x2F;&#x2F;www.careersatsafeway.com&#x2F;desktop&#x2F;home</a> -- which is very much not about jobs at safeway -- appears to be an Indonesian gambling&#x2F;gaming site.<p>Safeway.com has <i>zero</i> email contacts published and expects communication to be via phone call or chatbot. I found their domain admin email and sent them info with no response, and no change to their site behavior.<p>This makes me think that they might be ripe for more monkey business but that&#x27;s not my thing. Oh well.
评论 #38938561 未加载
评论 #38936334 未加载
评论 #38939084 未加载
quickthrower2over 1 year ago
Firebase is a shitshow. I say this as someone who really tried to like it and sadly built a project for a client using it.<p>Other than this security vuln, the issues vs. just using postgres are:<p>* It is more work! Despite being a backend as a service it is much less code to just write a simple API backend for your thing both in time to do it and time to learn how to do it. Think of Firebase as being on the abstraction level of Sinatra or express and you may as well just use those. Things like Firebase and Parse etc. are more complicated. For the same reason it is more complicate to walk to work with just your arms and no legs (even though there are fewer limbs to deal with and no backend!).<p>* Relational is king. Not being able to do joins really sucks. Yes you need to make async calls in a loop. NoSQL is premature optimisation.<p>* Lots of Googlization. This means lots of weird, hard to find out clickops configuration steps to get anything working. Probably why this security flaw existed(?).<p>* Emulator is flakey, so for local dev you need another cloud DB, and yes all that Googlized setup RSI inducing clickops.<p>* I reckon it is slower than postgres at the scale of starting a project. Traditional architecture are blitz fast on modern hardware and internet. Like playing a 90s game on your laptop.<p>* Apparently as you scale it gets pretty pricey.<p>The main thing is: it actually slows you down! The whole premise is this should speed you up.
评论 #38935624 未加载
评论 #38935417 未加载
评论 #38935443 未加载
评论 #38935906 未加载
评论 #38935467 未加载
评论 #38936282 未加载
评论 #38936244 未加载
评论 #38935335 未加载
评论 #38936717 未加载
评论 #38938007 未加载
hot_grilover 1 year ago
Article gets to the point very quickly, nice.
评论 #38935180 未加载
spepsover 1 year ago
Who&#x27;s to say they&#x27;re the first to discover this? They&#x27;re the first to discover it and do something to fix it.<p>I thought there was a US law now where breaches like this have to be reported?
评论 #38935166 未加载
评论 #38935860 未加载
评论 #38938542 未加载
alalbertsonover 1 year ago
no contact or thanks for potentially avoiding a lawsuit for them.
评论 #38935233 未加载
pieratover 1 year ago
And folks, this is why you sell your exploits to the highest bidder.<p>Being &quot;good&quot; and giving companies free work is a HORRIBLE idea. They&#x27;re never gonna pay, or even than you. If they&#x27;re not willing to treat security researchers properly, I see no reason to return the favor.<p>Remember security groups: if your company wont pay, there are others that will.
评论 #38937539 未加载
评论 #38939231 未加载
mmscover 1 year ago
Stepping aside for a moment and thinking about the scope of this, I think it’s a good example of why technological diversity is something to long for. If Chattr can be pwned like this so easily, they likely have many much more serious issues which in turn will affect half of America’s fast food chains.
评论 #38941173 未加载
lxeover 1 year ago
This is my problem with the whole architecture of FE -&gt; DB. Without a middle server layer, things like token storage, authentication, and other things become really easy to screw up.
评论 #38941595 未加载
评论 #38942254 未加载
lwhiover 1 year ago
It seems crazy that no thanks or recognition has been given.<p>Is this because doing so might be seen as an admission of liability, and could be used in any legal cases that are brought?
评论 #38938713 未加载
theonethingover 1 year ago
&gt; If you grab the list of admin users from &#x2F;orgs&#x2F;0&#x2F;users, you can splice a new entry into it giving you full access to their Administrator dashboard.<p>I&#x27;m not clear on this. Splice a new entry into what? The list of admin users? And then do what with it?
评论 #38937479 未加载
评论 #38937747 未加载
Sparkyteover 1 year ago
Ethical hacking is a good thing.<p>Nice to see someone doing good.
评论 #38939648 未加载
评论 #38939803 未加载
miekover 1 year ago
Well done, well written, great tact. Luckily we have HN to fill the gap on the missing kudos. What an unprofessional firm (chattr)
unotiover 1 year ago
I worked with Firebase for a while, lured in because of how easy it was to do certain things. It makes certain kinds of operations essentially zero effort, such as getting realtime updates on the frontend when something changes. But it also creates a huge amount of effort that is trivial with other frameworks, such as creating a huge effort for security. I found that what I gained in convenience, I lost by needing to do so much work continuously battling with security rules. I left it behind and never looked back, and it made me much more cheerful about the work that I needed to do to establish and maintain more conventional backend data systems.
评论 #38940780 未加载
zharknadoover 1 year ago
From Eva’s post:<p>&gt; we didnt know much about firebase at the time so we simply tried to find a tool to see if it was vulnerable to something obvious and we found firepwn, which seemed nice for a GUI tool, so we simply entered the details of chattr&#x27;s firebase<p>Genuinely curious (I’ve no infosec experience), wouldn’t there be a risk that a tool like this could phone home and log everything you find while doing research?
评论 #38942461 未加载
评论 #38937072 未加载
评论 #38938262 未加载
bomewishover 1 year ago
They need to pay this guy 100k. And fire someone.
评论 #38939169 未加载
评论 #38939734 未加载
andrecariniover 1 year ago
How much would this leak go for in the darknet?
评论 #38938827 未加载
946789987649over 1 year ago
If they&#x27;re already using firebase, can anyone think why they are storing passwords? Firebase Authentication is incredibly easy and quick to setup and use (less than a day for someone new to it), which means you have no need to worry about passwords.
评论 #38941766 未加载
评论 #38941204 未加载
simonebrunozziover 1 year ago
&gt; No contact or thanks has been received back so far<p>WTF.
评论 #38935589 未加载
评论 #38940533 未加载
评论 #38937915 未加载
评论 #38936766 未加载
habosaover 1 year ago
Sad that in 2024 people continue to set their Firebase security rules to be wide open. Back in maybe 2015-2019 that was excusable because that was the default but now it’s just lazy.<p>Don’t expose your database &#x2F; api &#x2F; blob storage bucket &#x2F; etc to the public! It’s not that hard to do it right, or at least “right enough” that you can’t get owned by someone scanning a whole TLD.
评论 #38941006 未加载
评论 #38940554 未加载
digitcatphdover 1 year ago
This is extremely annoying. Instead of fucking with other people’s companies why not build your own?<p>You pwned them? What are you twelve? All you did was commit a felony and post it online.
评论 #38941169 未加载
评论 #38941175 未加载
评论 #38941565 未加载
评论 #38941135 未加载
评论 #38941144 未加载
评论 #38941177 未加载
tmalyover 1 year ago
Dude should have gotten some free chicken for his efforts.
Erratic6576over 1 year ago
So the hacker worked for free?
评论 #38940308 未加载
mihaalyover 1 year ago
&quot;move fast and break things&quot; - Mark Elliot Zuckerberg
1-6over 1 year ago
We need Whitehat awards and give this person that.
tech_kenover 1 year ago
Lol. Lmao even. Great writeup
SoftTalkerover 1 year ago
At this point I would not apply for a job if the employer used a third party online service. Seek out employers who do their own hiring and talk to candidates face-to-face.<p>If they steer you to one of these third party services, send your resume by snail mail directly to the HR director with a cover letter highlighting all the data breaches such as this one, LinkedIn, Indeed, etc. You&#x27;ll stand out as someone who pays attention.
评论 #38935873 未加载
ashu1461over 1 year ago
Firebase is like a half baked product which lures people who are just starting out .It helps build products which can quickly go to market, but then once you start to scale, a lot of their products like firestore, firebase auth have basic features missing
8organicbitsover 1 year ago
I would have stopped once I confirmed the leaked keys were valid. Looking at what types of data you had access to wasn&#x27;t required. Downloading plaintext passwords of other people is probably too far. Impacted users may need to be notified about a breach. If needed, create an account of your own and target only that.<p>If there was a pentester agreement, safe harbor, or other protection that&#x27;s different. Be careful out there.
评论 #38937999 未加载
评论 #38937798 未加载