Biz & IT —

In major goof, Uber stored sensitive database key on public GitHub page

Ride-sharing service subpoenas GitHub for IP addresses that accessed security key.

In major goof, Uber stored sensitive database key on public GitHub page

Uber is trying to force GitHub to disclose the IP address of every person that accessed a webpage connected to a database intrusion that exposed sensitive personal data for 50,000 drivers. The court action revealed that a security key unlocking the database was stored on a publicly accessible place, the online equivalent of stashing a house key under a doormat.

Uber officials have yet to say precisely what information was contained in the two now-unavailable GitHub gists. But in a lawsuit filed Friday against the unknown John Doe intruders, Uber lawyers said the URLs contained a security key that allowed unauthorized access to the names and driver's license numbers of about 50,000 Uber drivers. The ride-sharing service disclosed the breach on Friday, more than two months after it was discovered.

"The contents of these internal database files are closely guarded by Uber," the complaint stated. "Accessing them from Uber’s protected computers requires a unique security key that is not intended to be available to anyone other than certain Uber employees, and no one outside of Uber is authorized to access the files. On or around May 12, 2014, from an IP address not associated with an Uber employee and otherwise unknown to Uber, John Doe I used the unique security key to download Uber database files containing confidential and proprietary information from Uber’s protected computers."

The language has led to widespread speculation that the pages at issue were made by an Uber employee or contractor who stored a confidential authorization key on the GitHub service. One or more of the unknown John Doe defendants then found the key some time in 2014 and used it to access the Uber database. Uber officials declined to comment on the record, but the company didn't challenge the claim. Uber's release on Friday said: "Immediately upon discovery we changed the access protocols for the database, removing the possibility of unauthorized access."

It's not the first time people have posted highly confidential data to publicly accessible GitHub pages. In a January 2013 post headlined PSA: Don’t upload your important passwords to GitHub, Ars reported basic searches turned up dozens of passwords and security keys stored on publicly accessible GitHub pages. In some cases, the passwords appeared to secure sensitive information for high-target companies and projects, including the Chromium, a repository that stores the source code for Google's open source browser.

Uber already has been accused of using its vast database of customer trips to track the comings and goings of journalists and VIP riders. The wording of Uber's complaint, saying a security key protecting the Uber database was stored on a publicly assessable GitHub page, is a step backwards for Uber as it attempts to reassure the public that the significant amount of information it holds is safe from prying eyes. It could also attract scrutiny from state or federal watchdogs or from private attorneys representing people injured as a result of Uber's security lapses.

Channel Ars Technica