Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Bad .env hurts for the rest of life

Bad .env hurts for the rest of life

Scheduled Pinned Locked Moved The Lounge
databasecomjson
11 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Offline
    L Offline
    Lutoslaw
    wrote on last edited by
    #1

    This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

    L J F K D 6 Replies Last reply
    0
    • L Lutoslaw

      This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      Just wow! I wonder how many of these websites use a template service and just copy database connection code from lets say.. Q&A? ;P :laugh:

      When you are dead, you won't even know that you are dead. It's a pain only felt by others. Same thing when you are stupid.

      1 Reply Last reply
      0
      • L Lutoslaw

        This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

        J Offline
        J Offline
        Jacquers
        wrote on last edited by
        #3

        Wow, that's really bad! :wtf:

        1 Reply Last reply
        0
        • L Lutoslaw

          This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

          F Offline
          F Offline
          Foothill
          wrote on last edited by
          #4

          So this is how spammers are getting 'authenticated' email through the ole spam filters. And don't get me started with exposing your database passwords on the internet. :doh:

          if (Object.DividedByZero == true) { Universe.Implode(); }

          1 Reply Last reply
          0
          • L Lutoslaw

            This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

            K Offline
            K Offline
            kmoorevs
            wrote on last edited by
            #5

            :wtf: Looks like something used in Node/React (based on a quick search as I've never heard of a .env file) similar to a web.config. I wonder if this is a problem with the technology or just a misconfigured webserver? Either way, look on the bright side, the developers appear to be using strong passwords! :laugh:

            "Go forth into the source" - Neal Morse

            R L 2 Replies Last reply
            0
            • L Lutoslaw

              This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

              D Offline
              D Offline
              dandy72
              wrote on last edited by
              #6

              I'm somewhat reminded of how you could search for Outlook PSTs on Google and it brought back instances where people were somehow sharing their entire Outlook email file with the rest of the world...

              1 Reply Last reply
              0
              • K kmoorevs

                :wtf: Looks like something used in Node/React (based on a quick search as I've never heard of a .env file) similar to a web.config. I wonder if this is a problem with the technology or just a misconfigured webserver? Either way, look on the bright side, the developers appear to be using strong passwords! :laugh:

                "Go forth into the source" - Neal Morse

                R Offline
                R Offline
                Ryan Peden
                wrote on last edited by
                #7

                Well, you *can* use them in a Node project, if you go out of your way to do so. I think that Laravel (a PHP framework) uses them by default also. I suppose you could use them from any language or framework, if you really wanted to. It mostly looks like people making the mistake of putting their db credentials in a file and then leaving the file in a place that lets the web server send it out to anyone who asks for it. The whole thing seems a bit dumb since one of the reasons to store your production DB credentials in environment variables is so they won't be sitting in a file somewhere.

                1 Reply Last reply
                0
                • K kmoorevs

                  :wtf: Looks like something used in Node/React (based on a quick search as I've never heard of a .env file) similar to a web.config. I wonder if this is a problem with the technology or just a misconfigured webserver? Either way, look on the bright side, the developers appear to be using strong passwords! :laugh:

                  "Go forth into the source" - Neal Morse

                  L Offline
                  L Offline
                  Lutoslaw
                  wrote on last edited by
                  #8

                  kmoorevs wrote:

                  Either way, look on the bright side, the developers appear to be using strong passwords!

                  My favourite one is DB_PASSWORD=murder4513. Quite strong and definitely capital, so to speak, rights? :laugh:

                  K 1 Reply Last reply
                  0
                  • L Lutoslaw

                    This will be a heavy one. Feel free to troll... and check where do you store your password :wtf: db_password filetype:env inurl:com - Google Search[^]

                    R Offline
                    R Offline
                    Rage
                    wrote on last edited by
                    #9

                    Wow. Since I am database illiterate, what is wrong here ? That you can see the .env file from external or that the password is stored in there ?

                    Do not escape reality : improve reality !

                    L 1 Reply Last reply
                    0
                    • L Lutoslaw

                      kmoorevs wrote:

                      Either way, look on the bright side, the developers appear to be using strong passwords!

                      My favourite one is DB_PASSWORD=murder4513. Quite strong and definitely capital, so to speak, rights? :laugh:

                      K Offline
                      K Offline
                      kmoorevs
                      wrote on last edited by
                      #10

                      Jacek Gajek wrote:

                      My favourite one is DB_PASSWORD=murder4513

                      Reminds me of a Police tune...'Murder by Numbers'!

                      "Go forth into the source" - Neal Morse

                      1 Reply Last reply
                      0
                      • R Rage

                        Wow. Since I am database illiterate, what is wrong here ? That you can see the .env file from external or that the password is stored in there ?

                        Do not escape reality : improve reality !

                        L Offline
                        L Offline
                        Lutoslaw
                        wrote on last edited by
                        #11

                        Rage wrote:

                        That you can see the .env file from external or that the password is stored in there ?

                        Both of them. In normal situation you have two layers of security - first, the attacker has to access a private network and second -- he needs to login to a database. Here the second layer is gone. And if access to DB is NOT restricted to private network then... it's not good.

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups