Starbucks API Key Exposed on GitHub Leads to Critical JumpCloud Breach

A developer mistake exposed a Starbucks JumpCloud API key on GitHub, triggering a critical security breach that allowed attackers to access internal systems, manipulate user accounts, and even control AWS resources, ultimately resulting in a $4,000 bounty for the researcher.

Programmer DD
Programmer DD
Programmer DD
Starbucks API Key Exposed on GitHub Leads to Critical JumpCloud Breach

Due to a mistake by Starbucks developers, an API key was exposed in a public GitHub repository, enabling attackers to access internal systems and modify authorized user lists.

The vulnerability was classified as Critical because the key grants access to Starbucks' JumpCloud API.

Impact

Bug bounty hunter Vinoth Kumar discovered the key in the public repository and disclosed it through HackerOne after verification. JumpCloud is an Active Directory management platform marketed as an Azure AD alternative, offering user management, single sign‑on (SSO), and LDAP services.

Kumar reported the issue on October 17; three weeks later Starbucks responded, describing the breach as involving a "large amount of sensitive information" and offering a bounty.

Starbucks quickly remedied the problem, deleting the repository and rotating the API key by October 21. The response took longer than usual because the company needed to fully understand the severity and implement comprehensive remediation.

Kumar also provided proof‑of‑concept code demonstrating the potential attacks, which included querying internal systems, controlling the Amazon Web Services (AWS) account, executing commands on target systems, and adding or removing users.

Bounty

After negotiations, the researcher received a $4,000 bounty, the highest Starbucks has ever paid for a vulnerability; typical rewards range from $250 to $375.

Since launching its bug bounty program in 2016, Starbucks has handled 834 vulnerability reports, processing 369 in the past three months and distributing a total of $40,000 in rewards.

The previous major Starbucks vulnerability involved a sub‑domain takeover of an abandoned Azure cloud host, for which the company paid a $2,000 bounty.

This article was compiled and translated by WhiteHatHub and does not represent any views or positions of WhiteHatHub.
Source: https://www.bleepingcomputer.com/news/security/starbucks-devs-leave-api-key-in-github-public-repo/
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

API SecurityStarbucksbountyGitHub leakJumpCloud
Programmer DD
Written by

Programmer DD

A tinkering programmer and author of "Spring Cloud Microservices in Action"

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.