Danish Bank Leaves Server In Debug Mode, Exposes Sensitive Data In JS Comments 41
An anonymous reader writes: Dutch IT security expert Sijmen Ruwhof has found a pretty big blunder on the part of Danske Bank, Denmark's biggest bank, which exposed sensitive user session information in the form of an encoded data dump, in their banking portal's JavaScript files. The data contained client IP addresses, user agent strings, cookie information, details about the bank's internal IT network, and more. He contacted the bank, who fixed the issue, but later denied it ever happened.
Similar experience here (Score:1)
Re: (Score:1)
Then those credentials would be in a compiled binary.
The proper way to do credentials is to supply them by hand when a server/service starts up.
Yes, that means physical, human intervention every time the server/service restarts.
Re: (Score:2, Interesting)
Unless there's DB credentials or other sensitive information in it.
DB credentials In the SOURCE code? security: FAIL.
You NEVER put the DB credentials in the source, nor do you put things like internal IP's or hostnames. NEVER EVER. At the very least you put stuff like this in separately maintained configuration files. If you are wanting real security then you encrypt said files and provide the decryption key upon system startup. Just putting in plain text credentials is akin to hard coding SQL statements and other such foolish things I've seen folks do. If you have
Re: (Score:2)
Indeed, it's quite annoying.
Clean up your code! (Score:3)
Seriously, clean up your code before committing or signing off on a task.
They didn't deny it happened, just that it was bad (Score:5, Insightful)
From TFA, the bank wrote "We investigated your report immediately. However, the data you saw was not real customer sessions or data – just some debug information. Our developers corrected this later that day."
Sounds like a lot of crying over nothing. The bank acknowledged and fixed the problem. Winning, right?
Re: (Score:1)
We investigated your report immediately. However, the data you saw was not real customer sessions or data – just some debug information.
--Baghdad Bob
These are not the Auth Cookies you are looking for (Score:5, Interesting)
If he had tried he would see that the cookies in question are not authentication cookies used by the bank. The cookies in question are described as 'statistical' cookies on http://www.danskebank.com/en-u... [danskebank.com]
I'm really amazed about the publicity one single blogger can get with such undocumented claims.
Re:These ARE the Auth Cookies you are looking for (Score:3)
That page does not list these two cookies:
It's clearly ASP.NET, and WebForms. The dump is the Request.ServerVariables collection, and if you need to debug issues it's fairly standard. If you need to put it in production code, though, you always put it on a server that your load balancer will skip, because that should not be seen, at all, by anyone.
But how would
Re: (Score:1)
mbox is probably Site Catalyst: http://cookiepedia.co.uk/cooki... [cookiepedia.co.uk]
Anyway, A danish customer checked it and found out that session related cookies to the homebanking solution (which is hosted elsewhere) is called NSSID. https://twitter.com/kimtiede/s... [twitter.com]
They should have (Score:2)
False Alarm (Score:4, Interesting)
Most likely this was simply their IP address or the IP address of some networking hardware or proxy downstream from them and the only reason it changed between refreshes was that it was a dynamic IP.
Simply dumping the contents of the $_SERVER variable in PHP could yield a screen full of variables like this. Many of these name/value pairs are also present in the HTTP headers that are exchanged between the client and server.
What IP could it really be? (Score:2)
Re: (Score:2)
One scenario for that would be a load-balancer in a specific configuration in the loop.
Re: (Score:2)
that doesn't explain the user-agent discrepancy.
Re: (Score:2)
THAT's how you do security . . .
Well, it's a start anyway.... That they turned off the debugging information was also a step in the right direction too...
Noob Analysis (Score:1)
Re: (Score:1)
Re: (Score:1)
can be sued / jailed for loses at least in usa for (Score:2)
can be sued / jailed for loses at least in usa for doing that hear.
Related background (Score:2)