The UN is getting a serious diplomatic lesson in data leakage this week.
As the United Nations General Assembly continues this week in New York City, a pair of reports from different security researchers finds that a number of the UN's websites have been leaking data for some time, thanks to exposed files and poor security practices.
The first report finds that the UN accidentally published some sensitive materials, which include passwords and technical papers, after someone misconfigured some popular, web-based applications used to manage workflow, including Trello, Jira, as well as Google Docs.
Kushagra Pathak, an independent security researcher, found the misconfigured files, which were available to anyone with the proper link. After first finding more than 60 of these files exposed in August, Pathak alerted officials within the UN and then shared the information with The Intercept on September 24.
In August, I found 60 Trello boards, a public Jira and bunch of Google Docs of UN which were containing credentials to multiple FTP servers, social media & email account, lots of internal comm. and documents. @micahflee wrote an excellent article about it https://t.co/5nHWitM2lw— Kushagra Pathak (@xKushagra) September 24, 2018
As part of his research, Pathak found several Trello boards exposed to the wider Internet and through those he then found Jira tickets, as well as Google Docs, with each gradually exposing more and more sensitive information.
For example, according to The Intercept, Pathak found:
One public Trello board used by the developers of Humanitarian Response and ReliefWeb, both websites run by the U.N.'s Office for the Coordination of Humanitarian Affairs, included sensitive information like internal task lists and meeting notes. One public card from the board had a PDF, marked "for internal use only," that contained a map of all U.N. buildings in New York City.
Although Pathak contacted UN security officials about the exposed files and applications, a representative told him that their security team could not reproduce the vulnerability. After being contacted by The Intercept, the files were then taken down, according to the report.
Following that report, Mohamed Baset, a security researcher with Seekurity, which conducts penetration testing, published a blog post detailing how he found a vulnerability in a WordPress-based UN website that exposed resumes and job applications sent to the organization.
After conducting some vulnerability testing, Baset and his team found a portal where applicants could upload their resumes if they were seeking a job with one of the organization's numerous divisions.
"Regardless that the application is not enforcing HSTS [HTTP Strict Transport Security], which means the application is supporting both HTTP and HTTPS versions, an MITM attacker would get your CV file while uploading it -- the application is vulnerable to local path disclosure," according to the September 24 blog post.
Overall, Baset claims that "thousands" of resumes, along with personal data, could have been exposed for months. As with the other case, Baset claims that he contacted UN officials but that he didn't hear back before writing his post.
In his blog post, Baset notes that this particular vulnerability is easy to patch. He recommends that anyone running WordPress-based websites should upgrade to the latest version and use security plug-ins to harden the site.
These types of data leaks are becoming more and more common as businesses and other organizations move toward cloud infrastructure to support their IT footprint, as well as investing more in software-as-a-service (SaaS) and web-based applications. In the past month, researchers found an exposed MongoDB belonging to Veeam that exposed millions of records. The database was hosted by the company on Amazon Web Services. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)