269 words
1 minutes
Clean Bowled🏏!! Personal numbers of CSK Superstars and a lot more leaked !!
2023-05-30

Hi Security researchers,

This is the story of how a simple revisit to a website turned into full AWS access, database backups, and accidental exposure of a cricket team’s internal data - all because nobody bothered to fix the bugs I reported years ago.

Relax, sit back. This one’s wild. 🏏💥

All findings were responsibly reported and fixed.
This write-up exists purely for educational and awareness purposes.


🕸️ Flashback: October 2021#

In October 2021, I reported some solid vulnerabilities on chennaisuperkings.com:

  • Authentication bypass
  • SQL injection
  • PII exposure

Serious stuff.
I waited for a response…

And waited…

Absolutely nothing.


⏳ May 29, 2022 — One Year Later#

Out of curiosity (and maybe a little frustration), I revisited the site.
Guess what changed?

NOTHING.

While scrolling through Burp Suite traffic, something popped into my eyes like a flashbang - an API response casually leaking full AWS credentials.

Yup. Right there. In plaintext.

{
  "result": {
    "AWS_S3_REGION": "ap-south-1",
    "IMAGE_NAME": "image.jpg",
    "AWS_S3_BUCKET": "XXXXXX",
    "AWS_S3_ACCESS_KEY_ID": "AKIXXXXXXXXXXXXXXXAQ",
    "AWS_S3_SECRET_ACCESS_KEY": "Secret-key",
    "AWS_S3_FAN_PAGES_PATH": "path"
  },
  "status": "SUCCESS"
}

This is never supposed to be exposed to the client.


Exploring the AWS Account#

With these leaked credentials, it became evident that the IAM policies were overly permissive.

I was able to list IAM users:

The AWS account contained multiple S3 buckets:

And several SQL database backup files:


Sensitive Data Exposure#

Inside one of the database backups, sensitive personal information was exposed - including the contact details of players and staff.

The leaked phone numbers even matched public caller databases.


Potential Impact#

If discovered by a malicious actor, these vulnerabilities could have enabled:

  • Full access to S3 buckets

  • Download of complete database backups

  • PII harvesting

  • Targeted phishing/social engineering

  • Tampering or deletion of data

  • Uploading malicious files to S3

  • Compromising site assets or user data

This wasn’t just a minor misconfiguration - It was a complete cloud compromise risk.


Reach me#

@0xraminfosec

Clean Bowled🏏!! Personal numbers of CSK Superstars and a lot more leaked !!
https://0xram.com/posts/csk/
Author
0xRaminfosec
Published at
2023-05-30