TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

TechCrunch stores user passwords in plain text

15 点作者 codingninja将近 8 年前
I tried to signup for TechCrunch Disrupt to pitch our VC funded predictive analytics platform that uses heuristics and ML to find what is driving users to convert and identifies potential changes you can make to your website to drive conversion growth and got a very silly SQL error that showed them inserting my password in plain text!<p>(error code 22001) SQLSTATE[22001]: [Microsoft][ODBC Driver 13 for SQL Server][SQL Server]String or binary data would be truncated. (SQL: insert into [battle_users] ([userEmail], [userPassword], [activationCode], [isFastTrack], [event_id]) values (david@retroanalytics.io, aQojvBPZK9ZXcJw49dK{oeF6GRDm4E)(T4XMQrCN]c,$Vj86470V242wu&amp;mbsCf*;L2Q, 0, 138, ?))<p>Simply enter a long password on https:&#x2F;&#x2F;battlefieldaustralia.techcrunch.com&#x2F;auth&#x2F;register to receive the error yourself

3 条评论

CM30将近 8 年前
Damn, that seems pretty bad. That said, could this be a problem with the Startup Battlefield mini site or do you think it&#x27;s common practice across TechCrunch as a whole?<p>Part of me cynically thinks the latter, but another part of me thinks a lazy developer could have taken shortcuts with what they saw as a less important part of the site. Either way, it&#x27;s bad news and I hope they address it soon.
评论 #15026559 未加载
tedmiston将近 8 年前
More accurate &#x2F; precise headline: <i>TechCrunch Startup Battlefield Australia site stores user passwords in plaintext</i><p>At the bottom it says &quot;Powered by Trackiva&quot; which looks to be a splash page service.<p>&gt; Trackiva is the platform that powers the famous TechCrunch Battlefield application selection process.<p>So really it sounds like this splash page service, which looks to be relatively unknown in Google is insecure, making (at least) some of the OWASP Top 10 vulnerabilities.<p>Apparently the app is made by this company Fardini Media (<a href="https:&#x2F;&#x2F;www.fardinimedia.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.fardinimedia.com&#x2F;</a>). Hopefully they&#x27;ll find this thread from a Google Alert or something and fix it.
mtmail将近 8 年前
This website hasn&#x27;t been updated in a while. <a href="http:&#x2F;&#x2F;plaintextoffenders.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;plaintextoffenders.com&#x2F;</a> Scary how many websites still do that.<p>A website I would&#x27;ve never expected it was <a href="https:&#x2F;&#x2F;www.pm.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.pm.org&#x2F;</a>, a community website for Perl developers run by ... well Perl developers. <a href="https:&#x2F;&#x2F;what.thedailywtf.com&#x2F;topic&#x2F;1874&#x2F;perl-mongers&#x2F;5" rel="nofollow">https:&#x2F;&#x2F;what.thedailywtf.com&#x2F;topic&#x2F;1874&#x2F;perl-mongers&#x2F;5</a>