
A critical zero-day vulnerability in Bubble.io, the no-code platform for AI-based app development and publishing, exposes high-profile clients to serious data security risks. Despite security researchers’ repeated attempts to alert Bubble, the concerns remain unaddressed.
The vulnerability was detailed in a research repository on GitHub and reveals significant flaws in Bubble.io’s integration with Elasticsearch, a popular database search engine.Â
Popular enterprises relying on Bubble.io for app development, including Danone, SeaGate, Unity, Shopify, Paramount Pictures, HubSpot, Amazon, PWC, Yamaha, and L'Oreal, are now vulnerable to data breaches caused by these exploits.
By reverse-engineering Bubble.io’s JavaScript code and inspecting HTTP headers, the researchers discovered the exploitation vector, granting attackers the ability to execute arbitrary queries against the Elasticsearch database.
The exploit leverages the following issues in Bubble.io’s platform:
The above issues provide attackers with the ability to execute arbitrary requests, bypassing the platform’s access restrictions, and dump and exfiltrate entire databases, including custom-defined tables.
They can also attack other Bubble.io-hosted clients due to shared infrastructure and enumerate and profile customer subdomains to identify high-value targets.
Researchers Lucca and Pedro publicly disclosed these vulnerabilities only after Bubble.io ignored their private disclosures. Following months of silence, the researchers presented their findings through talks, a proof-of-concept (PoC) script, and an in-depth research paper.Â
The disclosed material demonstrates how attackers can exploit these flaws to obtain sensitive customer or company data.