Docker Hub had a security breach during which OAuth credentials "may" have been exposed, presumably for all Docker accounts. Their email mentions that they identified the issue on 2024.09.24, but they fail to mention how long it may have been going on prior to that. They invalidated the OAuth credentials, but the email that informs the users about this was sent on 2024.09.26, which provides a large enough window for the attacker to have cloned plenty of private repositories.
I have a Docker Hub account which was connected to my Bitbucket account which also contains private code. I failed to revoke the OAuth credentials years ago when I stopped using the integration and I completely forgot about it - my bad there.
I would like to find out if the credentials have been used to clone the source code. It's not possible to view such accesses in the audit log, even though an issue about this has been created ever since 2013 (BB-9452).
Unfortunately, I have a free account, so I can't contact support directly. If anyone else that can contact support asks them about this issue, I would also like to know if any private code was cloned by using the exposed OAuth credentials.
I guess qualified support personnel could interrogate the logs database and look for Docker Hub OAuth credentials (presumably for multiple accounts) being used from IP addresses that do not belong to the IP range(s) used by Docker Hub.
For reference, here's the email received from Docker Hub:
"Hello,
Thank you very much @Ben for looking into this.
To sum up for others who have been affected, there was no unauthorized access to my account using the OAuth tokens from Docker Hub during the past 30 days.
The Docker Hub team also got back to me and mentioned that they have no reason to believe the unauthorized access predates 24.09.2024. Furthermore, they mentioned ”The OAuth credentials alone are not sufficient alone to access customer data; another secret is required as well.” - I'm not sure if this means that the client secret wasn't exposed, but even if it does, in some cases the token would be sufficient.
In conclusion, it looks like the incident didn't result in private code getting exfiltrated. However, that is the case only for my account, and I guess it cannot be generalized. It's also worth noting that the Bitbucket team is still looking into this incident.
Hi @xbirt
I have opened a ticket with our support team on your behalf. Please check the email address registered with the account you used to raise this ticket for further correspondence.
Cheers!
- Ben (Bitbucket Cloud Support)
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.