Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

9/25/2018
12:10 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

United Nations' Websites Besieged by Data Leaks, Exposed Files

In time for the UN's General Assembly this week, two reports find that the United Nations' websites have been leaking data for months, thanks to unsecured files and applications.

The UN is getting a serious diplomatic lesson in data leakage this week.

As the United Nations General Assembly continues this week in New York City, a pair of reports from different security researchers finds that a number of the UN's websites have been leaking data for some time, thanks to exposed files and poor security practices.

The first report finds that the UN accidentally published some sensitive materials, which include passwords and technical papers, after someone misconfigured some popular, web-based applications used to manage workflow, including Trello, Jira, as well as Google Docs.

Kushagra Pathak, an independent security researcher, found the misconfigured files, which were available to anyone with the proper link. After first finding more than 60 of these files exposed in August, Pathak alerted officials within the UN and then shared the information with The Intercept on September 24.

As part of his research, Pathak found several Trello boards exposed to the wider Internet and through those he then found Jira tickets, as well as Google Docs, with each gradually exposing more and more sensitive information.

For example, according to The Intercept, Pathak found:

One public Trello board used by the developers of Humanitarian Response and ReliefWeb, both websites run by the U.N.'s Office for the Coordination of Humanitarian Affairs, included sensitive information like internal task lists and meeting notes. One public card from the board had a PDF, marked "for internal use only," that contained a map of all U.N. buildings in New York City.

Although Pathak contacted UN security officials about the exposed files and applications, a representative told him that their security team could not reproduce the vulnerability. After being contacted by The Intercept, the files were then taken down, according to the report.

Following that report, Mohamed Baset, a security researcher with Seekurity, which conducts penetration testing, published a blog post detailing how he found a vulnerability in a WordPress-based UN website that exposed resumes and job applications sent to the organization.

After conducting some vulnerability testing, Baset and his team found a portal where applicants could upload their resumes if they were seeking a job with one of the organization's numerous divisions.

"Regardless that the application is not enforcing HSTS [HTTP Strict Transport Security], which means the application is supporting both HTTP and HTTPS versions, an MITM attacker would get your CV file while uploading it -- the application is vulnerable to local path disclosure," according to the September 24 blog post.

Overall, Baset claims that "thousands" of resumes, along with personal data, could have been exposed for months. As with the other case, Baset claims that he contacted UN officials but that he didn't hear back before writing his post.

In his blog post, Baset notes that this particular vulnerability is easy to patch. He recommends that anyone running WordPress-based websites should upgrade to the latest version and use security plug-ins to harden the site.

These types of data leaks are becoming more and more common as businesses and other organizations move toward cloud infrastructure to support their IT footprint, as well as investing more in software-as-a-service (SaaS) and web-based applications. In the past month, researchers found an exposed MongoDB belonging to Veeam that exposed millions of records. The database was hosted by the company on Amazon Web Services. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14180
PUBLISHED: 2020-09-21
Affected versions of Atlassian Jira Service Desk Server and Data Center allow remote attackers authenticated as a non-administrator user to view Project Request-Types and Descriptions, via an Information Disclosure vulnerability in the editform request-type-fields resource. The affected versions are...
CVE-2020-14177
PUBLISHED: 2020-09-21
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to impact the application's availability via a Regex-based Denial of Service (DoS) vulnerability in JQL version searching. The affected versions are before version 7.13.16; from version 7.14.0 before 8.5.7; from versio...
CVE-2020-14179
PUBLISHED: 2020-09-21
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from...
CVE-2020-25789
PUBLISHED: 2020-09-19
An issue was discovered in Tiny Tiny RSS (aka tt-rss) before 2020-09-16. The cached_url feature mishandles JavaScript inside an SVG document.
CVE-2020-25790
PUBLISHED: 2020-09-19
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our secu...