Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
United Nations' Websites Besieged by Data Leaks, Exposed Files
In time for the UN's General Assembly this week, two reports find that the United Nations' websites have been leaking data for months, thanks to unsecured files and applications.
September 25, 2018
4 Min Read
The UN is getting a serious diplomatic lesson in data leakage this week.
As the United Nations General Assembly continues this week in New York City, a pair of reports from different security researchers finds that a number of the UN's websites have been leaking data for some time, thanks to exposed files and poor security practices.
The first report finds that the UN accidentally published some sensitive materials, which include passwords and technical papers, after someone misconfigured some popular, web-based applications used to manage workflow, including Trello, Jira, as well as Google Docs.
Kushagra Pathak, an independent security researcher, found the misconfigured files, which were available to anyone with the proper link. After first finding more than 60 of these files exposed in August, Pathak alerted officials within the UN and then shared the information with The Intercept on September 24.
In August, I found 60 Trello boards, a public Jira and bunch of Google Docs of UN which were containing credentials to multiple FTP servers, social media & email account, lots of internal comm. and documents. @micahflee wrote an excellent article about it https://t.co/5nHWitM2lw— Kushagra Pathak (@xKushagra) September 24, 2018
As part of his research, Pathak found several Trello boards exposed to the wider Internet and through those he then found Jira tickets, as well as Google Docs, with each gradually exposing more and more sensitive information.
For example, according to The Intercept, Pathak found:
"One public Trello board used by the developers of Humanitarian Response and ReliefWeb, both websites run by the U.N.'s Office for the Coordination of Humanitarian Affairs, included sensitive information like internal task lists and meeting notes. One public card from the board had a PDF, marked "for internal use only," that contained a map of all U.N. buildings in New York City."
Although Pathak contacted UN security officials about the exposed files and applications, a representative told him that their security team could not reproduce the vulnerability. After being contacted by The Intercept, the files were then taken down, according to the report.
Following that report, Mohamed Baset, a security researcher with Seekurity, which conducts penetration testing, published a blog post detailing how he found a vulnerability in a WordPress-based UN website that exposed resumes and job applications sent to the organization.
After conducting some vulnerability testing, Baset and his team found a portal where applicants could upload their resumes if they were seeking a job with one of the organization's numerous divisions.
"Regardless that the application is not enforcing HSTS [HTTP Strict Transport Security], which means the application is supporting both HTTP and HTTPS versions, an MITM attacker would get your CV file while uploading it -- the application is vulnerable to local path disclosure," according to the September 24 blog post.
Overall, Baset claims that "thousands" of resumes, along with personal data, could have been exposed for months. As with the other case, Baset claims that he contacted UN officials but that he didn't hear back before writing his post.
In his blog post, Baset notes that this particular vulnerability is easy to patch. He recommends that anyone running WordPress-based websites should upgrade to the latest version and use security plug-ins to harden the site.
These types of data leaks are becoming more and more common as businesses and other organizations move toward cloud infrastructure to support their IT footprint, as well as investing more in software-as-a-service (SaaS) and web-based applications. In the past month, researchers found an exposed MongoDB belonging to Veeam that exposed millions of records. The database was hosted by the company on Amazon Web Services. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)
Read more about:Security Now
About the Author(s)
Managing Editor, Light Reading
Prior to joining Enterprise Cloud News, he was director of audience development for InformationWeek, where he oversaw the publications' newsletters, editorial content, email and content marketing initiatives. Before that, he served as editor-in-chief of eWEEK, overseeing both the website and the print edition of the magazine. For more than a decade, Scott has covered the IT enterprise industry with a focus on cloud computing, datacenter technologies, virtualization, IoT and microprocessors, as well as PCs and mobile. Before covering tech, he was a staff writer at the Asbury Park Press and the Herald News, both located in New Jersey. Scott has degrees in journalism and history from William Paterson University, and is based in Greater New York.
You May Also Like
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics