Hacking

Bug hunter downloaded the entire Vine source code

The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy.

A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds looping them.

The security expert and bug hunter Avinash has discovered a flaw in Vine that allowed him to download a Docker image containing the source code of the application.

Docker is a widely used open platform for developers and sysadmins to build, ship, and run distributed applications, it allows administrators to run more apps on the same old servers.

While running a penetration test, Avinash  surprisingly discovered that Vine was using Docker images publicly available online.

Avinash used the Censys.io search engine to find dockers images online, and he found more that 80 images.

Censys.io gave me an interesting URL https://docker.vineapp.com in its result.” Avinash wrote in a blog post. “If it is supposed to be private, then why is it publicly accessible? There has to be some thing else to going on here. On googling /* private docker registry */ I get to know that the docker provides a functionality which allows a developer to host and share images through the web.”

censys Vine source code dockercensys Vine source code docker

One of the images named ‘vinewww‘ was related to the Vine application, he downloaded it and examined it with a docker image viewer.

He could not believe what I had found! The complete source code of the Vine platform was on the screen. The code includes API keys as well as third-party keys.

“I was able to see the entire source code of vine, its API keys and third party keys and secrets. Even running the image without any parameter, was letting me host a replica of VINE locally.” added the expert.

The hacker reported the issue to Vine that rewarded him with $10,080 Bounty award. Of course, the problem was fixed in a few minutes.

Below the complete timeline of the event that allowed the hacker to download the entire Vine Source Code.

  • March 21,2016 – Bug Reported through Hackerone
  • March 22,2016 – Need more info
  • March 31,2016 – Full exploitation shown
  • March 31,2016 – Bug fixed (within 5 min)
  • April 2,2016 – $10080 Bounty awarded

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Vine Source Code, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…

1 hour ago

Ivanti fixed two EPMM flaws exploited in limited attacks

Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…

3 hours ago

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days

Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…

12 hours ago

Fortinet fixed actively exploited FortiVoice zero-day<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…

14 hours ago

How Interlock Ransomware Affects the Defense Industrial Base Supply Chain

Interlock Ransomware 's attack on a defense contractor exposed global defense supply chain details, risking…

1 day ago

Marks and Spencer confirms data breach after April cyber attack

Marks and Spencer (M&S) confirms that threat actors stole customer data in the ransomware attack…

1 day ago