logoalt Hacker News

Tell HN: Fiverr left customer files public and searchable

658 pointsby morpheuskafkayesterday at 6:56 PM163 commentsview on HN

Fiverr (gig work/task platform, competitor to Upwork) uses a service called Cloudinary to process PDF/images in messaging, including work products from the worker to client.

Besides the PDF processing value add, Cloudinary effectively acts like S3 here, serving assets directly to the web client. Like S3, it has support for signed/expiring URLs. However, Fiverr opted to use public URLs, not signed ones, for sensitive client-worker communication.

Moreover, it seems like they may be serving public HTML somewhere that links to these files. As a result, hundreds are in Google search results, many containing PII.

Example query: site:fiverr-res.cloudinary.com form 1040

In fact, Fiverr actively buys Google Ads for keywords like "form 1234 filing" despite knowing that it does not adequately secure the resulting work product, causing the preparer to violate the GLBA/FTC Safeguards Rule.

Responsible Disclosure Note -- 40 days have passed since this was notified to the designated vulnerability email ([email protected]). The security team did not reply. Therefore, this is being made public as it doesn't seem eligible for CVE/CERT processing as it is not really a code vulnerability, and I don't know anyone else who would care about it.


Comments

evmakitoday at 2:25 AM

Extremely bad stuff here. Can't believe it's been 7 hours now and you can still pull up people's complete prepared tax returns right from a Google search. This should be a business-ending breach of trust and good practices, but I worry there's probably a lack of regulatory might or will to make anything happen.

show 1 reply
viareduxtoday at 7:42 AM

I am a freelancer on Fiverr, this is VERY concerning. The amount of PII that I have sent over Fiverr, after sending NDA's is potentially all out in the public. I hope there will be accountability for this. IMO Fiverr has had terrible management for years! They simply do not care about their freelancers (and apparently also not about their customers).

show 2 replies
pesustoday at 12:06 AM

Wow, the other comments weren't exaggerating. This is really bad. If my tax returns or other data were part of this, I might consider legal action.

I wonder if somewhere like Wired/Ars Technica/404media might pick this up?

show 4 replies
applfanboysbgonyesterday at 10:22 PM

Software development jobs are too accessible. Jobs with access to/control over millions of people's data should require some kind of genuine software engineering certification, and there should be business-cratering fines for something as egregious as completely ignoring security reports. It is ridiculous how we've completely normalised leaks like this on a weekly or almost-daily basis.

show 9 replies
mtmailyesterday at 7:15 PM

You followed the correct reporting instructions.

https://www.fiverr.com/.well-known/security.txt only has "Contact: [email protected]" and in their help pages they say "Fiverr operates a Bug Bounty program in collaboration with BugCrowd. If you discover a vulnerability, please reach out to [email protected] to receive information about how to participate in our program."

gregsadetskyyesterday at 10:49 PM

I wrote to [email protected] and they just replied:

"You’re the second person to flag this issue to us

Please note that our records show no contact with Fiverr security regarding this matter ~40 days ago unlike the poster claims. We are currently working to resolve the situation"

show 3 replies
HeliumHydrideyesterday at 10:39 PM

It seems that someone sent a DMCA complaint months ago relating to this: https://lumendatabase.org/notices/53130362

show 1 reply
wxwyesterday at 7:28 PM

Wow, surprised this isn't blowing up more. Leaking form 1040s is egregious, let alone getting them indexed by Google...

npilktoday at 2:52 AM

Remember, if you use Google to access any of this “private” information, you’re a hacker and the state of Missouri might try to arrest you!

https://missouriindependent.com/2021/10/14/missouri-governor...

qingcharlesyesterday at 10:07 PM

That's wild. Thousands of SSNs in there. Also a lot of Fiverr folks selling digital products and all their PDF courses are being returned for free in the search results.

janoelzeyesterday at 10:02 PM

really bad stuff in the results. very easy to find API tokens, penetration test reports, confidental PDFs, internal APIs. Fiverr needs to immediately block all static asset access until this is resolved. business continuity should not be a concern here.

show 1 reply
Nekorosutoday at 8:51 AM

I was scammed on Fiverr myself, so I may be biased, but this feels consistent with the platform incentives I saw firsthand. The dispute process did not seem designed to deal well with coordinated abuse, and weak controls around sensitive files would point to the same broader issue: user safety and data handling do not appear to be high priorities.

Barbingtoday at 2:45 AM

@dang example query feels incredibly doxxy, and feels bad form to link directly to full copies of people's [stuff] and [personal info] as seen on this page :/

I know this is all Fiverr's fault for allegedly missing the responsible disclosure but now is this the ideal way for us to discuss, with these particular examples? I ask not to spare Fiverr, but I would be so mad if I were first for the result in OP or my personal info linked directly...

show 2 replies
janoelzetoday at 12:10 AM

it's been 5 hours. even manual action to take down the most sensitive files should have completed about 3 hours ago at most. what is happening.

show 2 replies
101008today at 2:07 AM

There are health stuff too... and they are not even paying attention to this matter

https://fiverr-res.cloudinary.com/image/upload/f_pdf,q_auto/...

show 1 reply
pcbluestoday at 7:49 AM

In spite of how the pollies sell it, regulation is the friend of anyone earning less than one million dollars per year. Regulation would fix this. Get on it.

show 1 reply
yellow_leadtoday at 8:54 AM

The files are deleted now, that was fun while it lasted!

johnmlussieryesterday at 9:44 PM

Probably not in scope but maybe https://bugcrowd.com/engagements/cloudinary will care?

This is bad.

show 1 reply
cleaningtoday at 1:11 AM

Wow this is really really bad. Insane this hasn't been fixed yet, media outlets are going to have a fun time with this story

ebbitoday at 2:22 AM

I've been boycotting Fiverr, so I'm glad I'm not caught up in this. And judging by their response to this issue, I'm glad I've been boycotting it.

show 1 reply
fudged71today at 5:33 AM

It's been 10 hours and all the links in this comment section still work...

show 1 reply
figassistoday at 2:47 AM

From what I’ve seen, this always ends in some small fine/settlement and “no admission of guilt”. This type of protection is the source of these mishaps.

psygn89yesterday at 11:02 PM

I guess they used Fiverr for security

epagatoday at 7:27 AM

I tried posting a warning to /r/fiverr but the admins removed the post. And the files are STILL public...how in the world is "sitting it out" their course of action?

Edit: I'm beginning to wonder if they might be locked out of their own site at this point. How hard could it be to just shut down the asset server until they get it sorted?

show 1 reply
unkl_today at 8:42 AM

Looks like the cloudinary links are returning 404 now

morpheuskafkatoday at 9:01 AM

Files are now returning 404s as of right now, 0900 UTC 4/15.

Would be interesting if someone with an account can check if they are visible to intended users or not, and if so, if their mitigation is robust (signed URLs?).

impish9208yesterday at 9:29 PM

This is crazy! So many tax and other financial forms out in the open. But the most interesting file I’ve seen so far seems to be a book draft titled “HOOD NIGGA AFFIRMATIONS: A Collection of Affirming Anecdotes for Hood Niggas Everywhere”. I made it to page 27 out of 63.

show 3 replies
nslsmtoday at 8:44 AM

I don't really see what the issue is here? Someone with access to the URL (either the freelancer or the client) leaked it to Google, Google crawled it. How is this Fiverr's fault? I mean, okay, they could sign URLs, but it's not like they left a folder with directory listing on. Someone with access to the URLs, not them, willingly made the URLs public.

rapfariatoday at 1:28 AM

How big of a client is Fiverr? Surely Cloudinary would have alerts for an enterprise client leaking stuff?

Just insane

show 1 reply
mraza007yesterday at 8:00 PM

Woah that's brutal all the important information is wild in public

sergiotapiayesterday at 10:24 PM

This is really bad, just straight up people's income, SSN and worse just right there in the search results on Brave Search even.

gostsamotoday at 4:28 AM

have you contacted the ftc if their regulation is being violated?

yieldcrvyesterday at 10:20 PM

this is a bad leak, appreciate the attempts at disclosure before this

smashahyesterday at 9:15 PM

They bought and.co and then dropped it. strange company

popalchemistyesterday at 9:06 PM

Burn it to the ground.

BoredPositronyesterday at 8:58 PM

Just by scrolling over it that's really rough.

iwontberudeyesterday at 9:19 PM

Loooool what a mess

csomartoday at 3:22 AM

Given the existing DMCA requests and the fact that Google has become way less aggressive about indexing this stuff, it's clear this has been going on for a while. My guess is they've gutted enough of their internal processes that they literally can't restrict access to these files without breaking their own platform.

You really can't make this shit up: https://www.linkedin.com/feed/update/urn:li:activity:7445526...

The real question is: will Fiverr be the first company to truly crash and burn from an "AI-first" approach? Go LLM, go mayhem!

show 1 reply
Jbird2ktoday at 2:45 AM

Bruh this stuff is still public

mark124mjtoday at 7:56 AM

[dead]

ecommerce_apptoday at 6:18 AM

[dead]

gta6newstoday at 8:52 AM

[dead]

gagagagagatoday at 2:50 AM

[dead]

fortran77today at 1:24 AM

[flagged]

TZubiritoday at 6:40 AM

I don't get why disclosing is considered acceptable, it seems like racketeering to me, "pay up or else I'll make this hypothetical issue an actual issue for you"

When I reported an issue and gotten no response, I sat on it for 6 years, reported it again and they took the whole site down without reaching out to me, never quite got it, but if people are doing this, it makes sense not to acknowledge any report and just play deaf.

show 2 replies
walletdraineryesterday at 10:13 PM

> Moreover, it seems like they may be serving public HTML somewhere that links to these files. As a result, hundreds are in Google search results, many containing PII

This is not how Google works.

show 2 replies