Complete toolkit for encrypting and decrypting Bubble.io payloads. This tool demonstrates a critical security vulnerability in Bubble.io's encryption implementation.
๐ธ๐ฆ ุงููุณุฎุฉ ุงูุนุฑุจูุฉ | ๐ Encryption Guide | ๐ Summary
This tool exposes a critical vulnerability in Bubble.io's encryption mechanism:
- โ
Fixed IVs: Uses hardcoded IVs (
'po9'and'fl1') for all applications - โ Weak Key Derivation: Only requires AppName to decrypt payloads
- โ No Authentication: No HMAC or signature verification
- โ Shared Secrets: Same encryption keys across all users
CVE: Pending
Impact: High - Data exposure, payload manipulation
Disclosure: Responsible disclosure to Bubble.io (see Pop_n_bubble.pdf)
This suite provides:
- ๐ Decryption Tool: Extract data from encrypted Bubble.io payloads
- ๐ Encryption Tool: Create encrypted payloads using Bubble.io's method
- โ Testing Suite: Verify encryption/decryption operations
- ๐ JSON Support: Direct encryption/decryption of JSON data
Bubble.io uses AES-CBC encryption with PBKDF2-MD5 key derivation:
-
x (IV): Encrypted Initialization Vector
- Input: Random 16-byte IV
- Fixed IV for encryption:
'fl1' - Key: Derived from AppName
-
y (Timestamp): Encrypted timestamp
- Input: Timestamp +
"_1"suffix - Fixed IV for encryption:
'po9' - Key: Derived from AppName
- Input: Timestamp +
-
z (Payload): Encrypted data
- Input: Your data (JSON or text)
- Key: Derived from AppName + Timestamp
- IV: The decrypted IV from (x)
1. Decrypt y โ Extract timestamp
2. Decrypt x โ Extract IV
3. Decrypt z โ Get original payload
# Clone the repository
git clone https://github.com/code-root/bubble-payload-encrypter.git
cd bubble-payload-encrypter
# Install dependencies
pip3 install cryptography# Interactive mode
python3 decrypt_optimized.py
# Or use the main decrypter
python3 payload_decrypter.py# Interactive mode
python3 payload_encrypter.py
# Quick example
python3 quick_encrypt.py# Run comprehensive tests
python3 test_encrypt_decrypt.pyfrom payload_decrypter import decrypt_bubble_payload
timestamp, iv, payload = decrypt_bubble_payload(
appname="your_app_name",
x_encrypted="encrypted_iv_base64==",
y_encrypted="encrypted_timestamp_base64==",
z_encrypted="encrypted_payload_base64=="
)
print(payload.decode('utf-8'))from payload_encrypter import encrypt_bubble_payload
result = encrypt_bubble_payload(
appname="your_app_name",
payload_data={
"app_version": "live",
"data": "sensitive information"
}
)
print(f"x: {result['x']}")
print(f"y: {result['y']}")
print(f"z: {result['z']}")payload_decrypter.py- Main decryption toolpayload_encrypter.py- Main encryption tooldecrypt_optimized.py- Enhanced decryption with better UXquick_encrypt.py- Quick encryption examplestest_encrypt_decrypt.py- Comprehensive test suite
README.md- This file (English)README_AR.md- Arabic documentationENCRYPTION_GUIDE_AR.md- Detailed encryption guide (Arabic)SUMMARY_AR.md- Project summary (Arabic)Pop_n_bubble.pdf- Security vulnerability analysis
example_decryption_result.json- Example decrypted dataexample_encrypted.json- Example encrypted data
- โ 60% code reduction through shared functions
- โ Optimized memory usage
- โ Efficient PBKDF2 key derivation
- โ Clean, well-documented code
- โ Full encryption/decryption support
- โ JSON and text support
- โ Auto-generate timestamp and IV
- โ Custom timestamp/IV support
- โ Save results to files
- โ Demonstrates Bubble.io vulnerability
- โ Educational tool for security research
- โ Proof-of-concept implementation
- โ Responsible disclosure documentation
FOR EDUCATIONAL AND SECURITY RESEARCH PURPOSES ONLY
This tool is provided for:
- โ Security research and education
- โ Authorized penetration testing
- โ Understanding encryption vulnerabilities
- โ Responsible disclosure demonstrations
DO NOT USE FOR:
- โ Unauthorized access to systems
- โ Data theft or manipulation
- โ Any illegal activities
- โ Attacking applications without permission
The authors are not responsible for misuse of this tool.
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Open a Pull Request
This project is released for educational purposes only. Use responsibly and ethically.
Security Research Team
For security issues or responsible disclosure:
- ๐ฑ WhatsApp: +201001995914
- ๐ GitHub Issues: Report here
- ๐ง Security Research: Contact via WhatsApp for responsible disclosure
โญ Star this repo if you find it useful for security research!