Security Incident Response #1221
Replies: 4 comments 10 replies
-
No offense, but wrong bucket permissions is the most preventable issue someone can have. I'm very disappointed reading this, but kudos for open communication and your response to this. |
Beta Was this translation helpful? Give feedback.
-
I didn't see them listed but just want to make sure, was environment data affected? |
Beta Was this translation helpful? Give feedback.
-
Could you please elaborate on what kinds of things are in "users' cache data" and "public media files"? I'm not sure I fully have a handle on that. Thank you in advance. |
Beta Was this translation helpful? Give feedback.
-
I see that my build archives are still available for download with unauthenticated link. Is this planned to be fixed? |
Beta Was this translation helpful? Give feedback.
-
On December 5th, we received a message from an independent security researcher telling us that one of our storages is misconfigured and allows unauthorized access to list all objects in the storage, including private user data.
As soon as we confirmed this vulnerability, we immediately removed unauthorized access to this information and also started implementing various measures to protect the data.
We are incredibly sorry that this happened. Security is a paramount goal to the entire team at Codemagic, and as soon as we became aware of the issue, we took immediate steps to protect your data.
We will continue to work with you to provide as much detail as possible about the incident, our response, and the actions we will be taking as a result.
Incident details
On Monday, December 5th, we learned that due to the misconfiguration of one of our Google Cloud buckets, the following data was potentially available to everybody via the Internet:
The storage in question is designed to store data using random and secure names which makes it impossible for anyone to connect the data to a specific user. Only authorized users can access the direct links to download the files. However, the bucket’s configuration allowed unauthorized users to list all objects in the storage, potentially leading to unauthorized access to approximately 140TB and 31 million files.
Our response
On the same day, December 5th, we modified the bucket’s permissions and removed access to list objects in the storage. As a precaution, we began cycling internal security credentials uploaded to the same storage.
We have confirmed that the storage didn’t contain any other sensitive information, such as user credentials or passwords, and the incident didn’t affect other internal storages. Additionally, we want to remind you that we don’t store any source code on our servers and this information cannot be compromised.
On Tuesday, December 6th, we completed transferring more than 24 million user and internal log files from the compromised storage to a new secured one. Our goal was to protect our users from potential leakage of sensitive information that logs might contain.
On Wednesday, December 7th, we began to implement additional security measures to completely remove access to the rest of the files in the compromised storage. We additionally began notifying our users of what had happened.
—
We take security seriously. We appreciate your trust and have done everything possible to protect your data. Along with the entire Codemagic team, I am sorry that this incident has occurred. We will continue to work hard to keep your data and systems secure. Please feel free to contact us for specific information about your data, or any more detail about how you can protect yourself from this incident.
Mikhail Tokarev
CTO at codemagic.io
Beta Was this translation helpful? Give feedback.
All reactions