Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

9/25/2018
12:10 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

United Nations' Websites Besieged by Data Leaks, Exposed Files

In time for the UN's General Assembly this week, two reports find that the United Nations' websites have been leaking data for months, thanks to unsecured files and applications.

The UN is getting a serious diplomatic lesson in data leakage this week.

As the United Nations General Assembly continues this week in New York City, a pair of reports from different security researchers finds that a number of the UN's websites have been leaking data for some time, thanks to exposed files and poor security practices.

The first report finds that the UN accidentally published some sensitive materials, which include passwords and technical papers, after someone misconfigured some popular, web-based applications used to manage workflow, including Trello, Jira, as well as Google Docs.

(Source: UN)
(Source: UN)

Kushagra Pathak, an independent security researcher, found the misconfigured files, which were available to anyone with the proper link. After first finding more than 60 of these files exposed in August, Pathak alerted officials within the UN and then shared the information with The Intercept on September 24.

As part of his research, Pathak found several Trello boards exposed to the wider Internet and through those he then found Jira tickets, as well as Google Docs, with each gradually exposing more and more sensitive information.

For example, according to The Intercept, Pathak found:

One public Trello board used by the developers of Humanitarian Response and ReliefWeb, both websites run by the U.N.'s Office for the Coordination of Humanitarian Affairs, included sensitive information like internal task lists and meeting notes. One public card from the board had a PDF, marked "for internal use only," that contained a map of all U.N. buildings in New York City.

Although Pathak contacted UN security officials about the exposed files and applications, a representative told him that their security team could not reproduce the vulnerability. After being contacted by The Intercept, the files were then taken down, according to the report.

Following that report, Mohamed Baset, a security researcher with Seekurity, which conducts penetration testing, published a blog post detailing how he found a vulnerability in a WordPress-based UN website that exposed resumes and job applications sent to the organization.

After conducting some vulnerability testing, Baset and his team found a portal where applicants could upload their resumes if they were seeking a job with one of the organization's numerous divisions.

"Regardless that the application is not enforcing HSTS [HTTP Strict Transport Security], which means the application is supporting both HTTP and HTTPS versions, an MITM attacker would get your CV file while uploading it -- the application is vulnerable to local path disclosure," according to the September 24 blog post.

Overall, Baset claims that "thousands" of resumes, along with personal data, could have been exposed for months. As with the other case, Baset claims that he contacted UN officials but that he didn't hear back before writing his post.

In his blog post, Baset notes that this particular vulnerability is easy to patch. He recommends that anyone running WordPress-based websites should upgrade to the latest version and use security plug-ins to harden the site.

These types of data leaks are becoming more and more common as businesses and other organizations move toward cloud infrastructure to support their IT footprint, as well as investing more in software-as-a-service (SaaS) and web-based applications. In the past month, researchers found an exposed MongoDB belonging to Veeam that exposed millions of records. The database was hosted by the company on Amazon Web Services. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5669
PUBLISHED: 2021-10-26
Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
CVE-2021-40343
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. Insecure file permissions on the nagios_unbundler.py file allow the nagios user to elevate their privileges to the root user.
CVE-2021-40344
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution.
CVE-2021-40345
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
CVE-2021-42343
PUBLISHED: 2021-10-26
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (ty...