Get a demo

Voyager18 (research)

Postman Data Leaks: A Technical Analysis of Exposed Sensitive Information in Postman

Postman, a widely used API development and testing platform, has recently been at the center of a concerning data leak incident. This platform, relied upon by developers globally, inadvertently exposed sensitive information due to improper handling of API keys, tokens, and other secrets. In this blog post, we delve into the details of these leaks, the underlying causes, and the broader implications for security in API management tools.

Yair Divinsky | December 25, 2024

TL;DR

Postman, a popular API development platform, recently faced a significant data leak due to improper handling of API keys, tokens, and other secrets. Researchers from organizations like Assetnote and CybelAngel discovered sensitive credentials exposed in public or poorly secured Postman workspaces. Key issues included misconfigured sharing permissions, lack of secrets management, delayed API key rotation, and insufficient developer training.

The leaks had real-world consequences, with exposed credentials leading to unauthorized access to cloud resources, payment gateways, and third-party APIs. To prevent such incidents, developers should implement strict access controls, use secrets management tools, rotate API keys regularly, and conduct security training. Postman has since rolled out a new policy to prevent public workspaces from exposing secrets.

This incident highlights the importance of secure API management practices to protect sensitive data in the software development lifecycle.

 

The discovery of the Postman data leak

The data leaks in Postman came to light when security researchers, including those at prominent organizations like Assetnote and CybelAngel, began investigating instances of improperly configured Postman environments. CloudSEK’s TRIAD team identified the critical security vulnerabilities and risks from the misuse of Postman Workspaces. The CloudSEK researchers found that developers were storing API keys, access tokens, and other sensitive credentials in public or poorly secured Postman workspaces. 

Such configurations allowed unauthorized access to sensitive information, posing significant risks to the organizations and individuals involved. 

The security team first identified patterns in publicly accessible Postman environments during their routine assessments. They noted that developers often used Postman to test APIs and inadvertently shared the testing environments without ensuring proper security settings. Findings emphasized the scale of the problem through their proprietary scanning tools, which uncovered thousands of leaked credentials across public repositories due to insecure usage of Postman and sensitive information in APIs. 

 

Technical analysis

The primary cause of these leaks lies in the improper use of Postman’s sharing features. Postman allows users to create and share workspaces for collaboration. However, without strict access controls, these workspaces can become publicly accessible, leading to the inadvertent exposure of sensitive data. Researchers highlighted several key issues: 

1. Misconfigured Sharing Permissions – Developers often shared workspaces without understanding the visibility settings. Publicly shared workspaces could be indexed by search engines or accessed by anyone with the URL. These workspaces contained environment files with embedded API keys, tokens, and sometimes plaintext passwords. 

2. Lack of Secrets Management – Many Postman users stored sensitive credentials directly in environment variables within the tool. While Postman offers features like secret management, not all users adopted them, leaving their data exposed. 

3. Absence of Proper API Key RotationEven when API keys were leaked, organizations often failed to rotate them promptly. This oversight allowed attackers to exploit the exposed keys for extended periods, potentially leading to unauthorized access to services or databases. 

4. Insufficient Awareness and Training – A significant contributing factor to these leaks was the lack of awareness among developers about the security implications of sharing Postman environments. Training gaps meant that best practices for secrets management and workspace sharing were often overlooked.

 

Real-world impact of the Postman data leaks

The researchers first found leaked refresh token with session secret and API Call: The team discovered a serious leak in a public Postman workspace where a refresh token and session secret of a major CRM software which they had exposed. Furthermore, the API endpoint for generating access tokens was included as well, allowing unauthorized users to potentially exploit the entire token lifecycle. 

For POC purposes, the researchers also tried reproducing the query mentioned in the exposed Postman workspace – a query that generates a public URL for a given dashboard page entity GUID. The dashboard page can then be accessed in the form of a static snapshot in the resulting public URL.‍ 

curl --location 'https://api.newrelic.com/graphql' \ --header 'API-Key: NRAK-257VYH6ITPM09G0M71C6FX48J82' \ --header 'Content-Type: application/json' \ --header 'guid: MTcyMTQ0MnxWSVp8REFTSEJPQVJEfGRhOjQxMTM1' \ --data '{"query":"mutation ($guid: EntityGuid!) {\r\n dashboardCreateSnapshotUrl(guid: $guid, params: {timeWindow: {duration: 604800000}})\r\n}\r\n\r\n","variables":{"guid":"MTcyMTQ0MnxWSVp8REFTSEJPQVJEfDEyNTE1MTM"}}' 

Public URL returned by the API, from: cloudsek.com/ 

The consequences of these leaks were far-reaching. In one instance, researchers found API keys that provided full administrative access to critical cloud resources. Such access could enable attackers to deploy malicious code, exfiltrate sensitive data, or disrupt services. Additionally, exposed credentials for payment gateways and third-party APIs posed financial risks, including unauthorized transactions and fraud. 

The leaks also highlighted broader issues in the software development lifecycle. The over-reliance on manual processes for managing API security credentials and the lack of automated secrets scanning tools exacerbated the problem. Organizations affected by these leaks faced reputational damage, regulatory scrutiny, and significant remediation costs.

Leaked Credentials of postman in the public Postman workspace, from: cloudsek.com/ 

 

Mitigation Measures and Best Practices

To prevent similar incidents, organizations and developers must adopt comprehensive security measures for API management tools like Postman. These include: 

  1. Implementing Strict Access Controls – Ensure that all workspaces are private by default and enforce robust authentication mechanisms for accessing shared environments. 
  2. Utilizing Secrets Management Tools – Leverage Postman’s built-in secrets management features or third-party tools to store sensitive credentials securely. 
  3. Regularly Rotating API Keys – Establish automated processes for rotating API keys and tokens to minimize the impact of accidental exposure. 
  4. Conducting Security Training – Educate developers on the importance of securing API environments and following best practices for sharing and collaboration. 
  5. Deploying Automated Scanning Tools – Use tools like Assetnote’s Surface Monitoring or CybelAngel’s scanning solutions to identify and remediate exposed credentials proactively. 

Following the disclosure of these findings, a new secret-protection policy has been implemented by Postman to prevent the exposure of sensitive data in public workspaces. In case secrets are detected, this new policy alerts users, offers resolutions, and facilitates transitions to private or team workspaces. 

The company also stated: “Starting this month, we are removing public workspaces with known exposed secrets from the Public API Network. As we roll out this policy change, owners of public workspaces containing secrets will be notified and could remove their exposed secrets before that workspace is removed from the network”. 

 

Conclusion

The Postman data leaks underscore the critical need for robust security practices in API development and management. While the platform itself provides numerous features to safeguard sensitive information, the onus remains on developers and organizations to use these features effectively. 

The collaborative efforts of researchers have been instrumental in bringing these issues to light and driving the conversation around secure API practices. 

As API usage continues to grow, so too must our vigilance in securing the tools and environments that power modern software development. By adopting the recommended best practices and fostering a culture of security awareness, we can mitigate the risks associated with API data leaks and ensure a safer digital ecosystem. 

 

Further reading

Each new vulnerability is a reminder of where we stand, and what we need to do better. Check out the following resources to help you maintain cyber hygiene and stay ahead of the threat actors:

    1. Q3 2024 Vulnerability Watch
    2. IBM’s Cost of a Data Breach 2024: What we learned
    3. Fixing the RCE flaw in the Common Unix Printing System (CUPS)
    4. Vulnerability disclosure policy (and how to get it right)
    5. OpenSSH again? How to fix CVE-2024-7589

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.

View more
Accept
Decline

Get rid of silos;

Start owning exposure risk

Test drive the leader in exposure risk management