Information Disclosure via a Code Beautifying Site
The internet is full of awesome free tools. I use CyberChef almost every day. Another example is Have I Been Pwned. These are great services and they do a lot of good. The tool we’ll focus on is codebeautify.org which among other things, beautifies code.
I’ve used sites like this extensively to beautify JSON. Throw in a mess of brackets and quotes and get out perfectly formatted data. Where is it transformed though? Is it sent to a server? Is it stored on the server? Free tools are great but it’s important to know what they’re doing.
A lot of the things I write about now are a result of interesting things I’ve seen while handling alerts as a security analyst. This is one of those things. While researching a malicious file, a Google result was for codebeautify.org. It contained some text that wasn’t really relevant. What stuck with me was that this person had beautified some code and somehow it was indexed by Google.
What You Came For
Obviously the next step was to see what other uploads could be searched. Passwords?
password is a common word and yields too many uninteresting results. That was kind of expected. What about
That’s more like it. 71 results isn’t much, but it’s honest work. Other keywords with results are
token "username". The results contain credentials for cloud databases, paid APIs, and in one case, an Azure Active Directory instance.
There is more information than just credentials. It could be a good starting point to find cloud resources or API endpoints.
At first I thought every upload was given a link. It turns out there’s a
Save & Share button. Although a link is generated, most people probably don’t expect it to be viewed by anyone with access to a search engine.
This is nothing groundbreaking. Google dorking has been around for a long time. Searching
site:pastebin.com apikey yields 1,190 results rather than just 71. Code Beautify is the top result for beautifying though and could yield valuable information that was supposed to be kept private. Add it to your toolbox and see what’s out there.