[conspire] Cloudbleed ahoy
Rick Moen
rick at linuxmafia.com
Sat Feb 25 11:11:06 PST 2017
Need something to do this weekend? How about changing your passwords on
substantially all Web sites?
Maybe only those on Web sites that have used San Francisco company
Cloudfare's CDN / reverse proxy services during the last six months.
Except, oops, you're not entirely sure which ones those are.
This is hardly the first time the firm has been in trouble over...
disturbing sets of facts. (/me waves at any Cloudfare Legal people
reading this mailing list & archives.)
https://en.wikipedia.org/wiki/Cloudflare#Criticism_and_controversies
https://en.wikipedia.org/wiki/Talk:Cloudflare
Details via three current news articles follow, quoted in part.
http://gizmodo.com/cloudbleed-password-memory-leak-cloudflare-1792709635
Change Your Passwords. Now.
Bryan Menegus
Yesterday 9:29am
A massive memory leak from Web services and security company
Cloudflare may have exposed user data for thousands of sites. In other
words: it’s time to change your passwords.
There’s lots left to discover about the impact of the leakage—which
is being called Cloudbleed, similar to the Heartbleed bug back in 2014.
What we do know that makes this so worrisome is that some of the memory
leaks, which may have included user data, was able to be cached by
search engines. Once indexed, nefarious types may have scraped and
stored that data.
[...]
https://www.wired.com/2017/02/crazy-cloudflare-bug-jeopardized-millions-sites/
Massive Bug May Have Leaked User Data from Millions of Sites.
So... Change Your Passwords
Lily Hay Newman.
Security
02.24.17. 12:53 PM.
The Internet infrastructure company Cloudflare, which provides a
variety of performance and security services to millions of Web sites,
revealed late Thursday that a bug had caused it to randomly leak
potentially sensitive customer data across the Internet.
The flaw was first uncovered by Google vulnerability researcher Tavis
Ormandy on February 17, but could have been leaking data since as long
ago as September 22. In certain conditions, Cloudflare’s platform
inserted random data from any of its six million customers—including big
names like Fitbit, Uber, and OKCupid—onto the Web site of a smaller
subset of customers. In practice, it meant that a snippet of information
about an Uber ride you took, or even your Uber password, could have
ended up hidden away in the code of another site.
For the most part, the exposed data wasn’t posted on well-known or
high-traffic sites, and even if it had been it wasn’t easily visible.
But some of the leaked data included sensitive cookies, login
credentials, API keys, and other important authentication tokens,
including some of Cloudflare’s own internal cryptography keys. And as
Cloudflare’s service spewed random information, that data was being
recorded in caches by search engines like Google and Bing and other
systems.
[...]
https://www.theregister.co.uk/2017/02/24/cloudbleed_buffer_overflow_bug_spaffs_personal_data/
Cloudbleed: Big Web brands leaked crypto keys, personal secrets thanks
to Cloudflare bug
Heartbleed-style classic buffer overrun blunder strikes in 2017
24 Feb 2017 at 01:47, Iain Thomson
Big-name Web sites leaked people's private session keys and personal
information into strangers' browsers, due to a Cloudflare bug uncovered
by Google researchers.
As we'll see, a single character – '>' rather than '=' – in Cloudflare's
software source code sparked the security blunder.
Cloudflare helps companies spread their Web sites and online services
across the Internet. Due to a programming blunder, for several months
Cloudflare's systems slipped random chunks of server memory into
Web pages, under certain circumstances. That means if you visited a
Web site powered by Cloudflare, you may have ended up getting chunks of
someone else's Web traffic bunged at the bottom of your browser page.
For example, Cloudflare hosts Uber, OK Cupid, and Fitbit, among
thousands of others. It was discovered that visiting any site hosted by
Cloudflare would sometimes cough up sensitive information from
strangers' Uber, OK Cupid, and Fitbit sessions. Think of it as sitting
down at a restaurant, supposedly at a clean table, and in addition to
being handed a menu, you're also handed the contents of the previous
diner's wallet or purse.
This leak was triggered when Web pages had a particular combination of
unbalanced HTML tags, which confused Cloudflare's proxy servers and
caused them to spit out data belonging to other people – even if that
data was protected by HTTPS.
[...]
More information about the conspire
mailing list