CloudDefense.AI Uncovers Internshala's Security Breach Exposes Users' Data

Barbara Ericson
3 Jul
2 min read

Internshala, one of the leading online platforms for internships and training, has recently been subjected to a significant security breach. CloudDefense security researchers have discovered a critical vulnerability in the ElasticSearch service hosted on the platform's asset. This security flaw allows unauthenticated access to the ElasticSearch server, potentially compromising sensitive data and exposing Internshala and its users to various risks.

CloudDefense reached out to the Internshala team on the 6th of April and they have taken the necessary steps to fix the issues.

Unauthenticated Access to ElasticSearch

The security researchers found that the ElasticSearch service hosted on Internshala's asset was accessible without any authentication. This means that an attacker, without needing to provide valid credentials, could perform a range of sensitive actions on the server. These actions include viewing, modifying, or even deleting data stored within ElasticSearch. The lack of proper access controls significantly increases the risk of unauthorized access and potential data compromise.

Affected Host

The ElasticSearch server vulnerable to the security breach can be accessed through a URL. (We can not share the URL in public)

Proof of Concept

To demonstrate the severity of the vulnerability, the CloudDefense security researchers have successfully conducted a proof of concept, showcasing how an attacker could exploit the unauthenticated access to ElasticSearch.


If an attacker gains unauthorized access to the ElasticSearch server, several severe impacts may occur:

Sensitive information indexed by ElasticSearch, such as customer data, credentials, or proprietary business data, could be accessed or exfiltrated. This puts Internshala's users and their confidential information at risk.

An attacker could manipulate or delete data stored within ElasticSearch. This could lead to data integrity issues, potentially disrupting Internshala's operations and affecting the reliability of the platform.

The absence of access controls enables an attacker to expose data to unauthorized entities or even the public. This can have serious consequences for Internshala's reputation and trustworthiness among its user base.

Barbara Ericson
A longtime open source contributor, with extensive experience in DevOps principles and practices. Barbara is especially interested in helping IT businesses and organizations implement DevOps, cloud-native technologies, and open source.