A few readers pointed us to an announcement by the Apache Foundation about a breach of their bugtracking software. First of all: Kudos to Apache for publishing a nice and detailed incident report [1]. The attack included a number of elements that in itself are frequently ignored, but if combined in an attack like this one, turn out to be deadly. Reading the blog post, a cross site scripting attack or simple password brute forcing was used to compromise the attack. While either attack appears to have the potential to succeed, it is not clear which one was finally used to gain access. The cross site scripting attack used an additional twist in hiding the malicious URL via tinyurl.com. This made it more likely that an administrator would actually click on the URL. Once the bug tracking system was compromised, the attacker modified it to log passwords. An administrator happened to use the same password to log in to the bug tracker as they use on the system itself. Lets skip to the lessons learned:
See the full blog post for more details and more lessons learned. [1] https://blogs.apache.org/infra/entry/apache_org_04_09_2010 ------ |
Johannes 4069 Posts ISC Handler Apr 13th 2010 |
Thread locked Subscribe |
Apr 13th 2010 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!