BugCrowd Bug Bounty Disclosure: P3 – Public Exposure of NASA FTP Credentials in CORAL Document (PDF Hosted on Google Docs) – sanrock

Public Exposure of NASA FTP Credentials in CORAL Document (PDF Hosted on Google Docs)

Public Exposure of NASA FTP Credentials in CORAL Document (PDF Hosted on Google Docs)

Researcher: sanrock
Engagement: National Aeronautics and Space Administration (NASA) – Vulnerability Disclosure Program
Disclosed at: 2025-10-31T18:02:31Z
Priority: P3
Status: Resolved

Summary

On October 17, 2025, I identified — through passive OSINT research — a publicly accessible document related to NASA’s CORAL (Coral Reef Airborne Laboratory) project containing FTP URLs with embedded credentials in plain text. The finding was responsibly reported through NASA’s official Vulnerability Disclosure Program (VDP) hosted on Bugcrowd. The issue was acknowledged, validated, and fully resolved by NASA in under seven days, and I received an official Letter of Appreciation recognizing the contribution to the security of NASA systems.

Methodology:

Total time from submission to resolution: less than 7 days.

While no exploitation was performed, the exposure of plaintext FTP credentials in public documentation could have led to:

Following the report, the NASA/JPL team:

This finding was obtained exclusively through passive, open-source methods. No authentication attempts, exploitation, or data access were performed at any stage. All credentials and sensitive information were redacted before sharing with Bugcrowd or NASA.

The goal of this disclosure is to highlight the effectiveness of responsible reporting and collaboration between researchers and government agencies. It demonstrates that responsible, ethical OSINT can identify real risks and help secure critical infrastructure — in this case, with a complete validation and resolution cycle of under one week.

Researcher: sanrock Program: NASA — Vulnerability Disclosure Program (via Bugcrowd) Status: Resolved

Activity Feed

Actor Details Timestamp (UTC)
Martin_NASA Martin_NASA published 2025-10-31T18:02:31Z
sanrock sanrock updated 2025-10-24T07:10:17Z
sanrock sanrock requested 2025-10-22T15:44:25Z
Spruiell_NASA Spruiell_NASA sent a: message 2025-10-22T13:23:18Z
hexghost_bugcrowd hexghost_bugcrowd changed the state to to resolved 2025-10-22T13:11:43Z
Martin_NASA Martin_NASA changed the state to to unresolved 2025-10-17T17:34:42Z
Martin_NASA Martin_NASA updated 2025-10-17T17:34:04Z
lemonade-bugcrowd lemonade-bugcrowd changed the severity to 2025-10-17T14:09:03Z
lemonade-bugcrowd lemonade-bugcrowd changed the state to to triaged 2025-10-17T14:08:43Z
lemonade-bugcrowd lemonade-bugcrowd sent a: message 2025-10-17T14:08:43Z
sanrock sanrock sent a: message 2025-10-17T14:06:15Z
lemonade-bugcrowd lemonade-bugcrowd changed the state to to nue 2025-10-17T14:00:46Z
lemonade-bugcrowd lemonade-bugcrowd marked the response request as resolved 2025-10-17T14:00:02Z
lemonade-bugcrowd lemonade-bugcrowd sent a: message 2025-10-17T14:00:00Z
sanrock sanrock sent a: message 2025-10-17T13:46:46Z
sanrock sanrock submitted a response request from 2025-10-17T13:44:34Z
sanrock sanrock sent a: message 2025-10-17T13:40:52Z
binbashsu-bugcrowd binbashsu-bugcrowd changed the state to to not_applicable 2025-10-17T13:30:06Z
binbashsu-bugcrowd binbashsu-bugcrowd sent a: message 2025-10-17T13:30:03Z
sanrock sanrock created the submission 2025-10-17T10:50:13Z

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features