Hi team,
Hope you are doing well.
Summary:
A set of Atlassian Jira auth credentials was found publicly exposed on GitHub in a
repository related to https://epam.atlassian.net.These credentials could allow an
attacker to log into the system and access internal data & escalate privileges.
Steps To Reproduce:
1- Navigate to :
https://github.com/Touheedk946/HomeWork/blob/a3781fb5083f20c49b7ea304c0246a5066f849
c1/Epam/Jira_Test/src/main/java/com/example/jira/Main.java#L12
2- Notice that the credentials are leaked at Line 12:
// Jira Base URL and Authentication Credentials
String baseUrl = "https://epam.atlassian.net";
String username = "
[email protected]";
String password = "bt5019DPa2#YU";
I stopped testing here as there is a big Success rate those creds are correct as
they are added only since one month.
Impact:
Unauthorized Access: Attackers can log in using the exposed credentials lead to
ATO.
Data Exposure: Potential access to sensitive internal data.
Privilege Escalation: If the user has admin privileges, an attacker could gain full
control.
Reputation Damage: Public exposure could lead to data leaks, compliance violations,
and trust issues.