backtop


Print 13 comment(s) - last by tastyratz.. on Dec 29 at 12:35 AM

File containing sensitive information was posted to common file server for all to see

These days internet firms seem to be having a tougher and tougher time holding on to your private data.  Following lost emails databases at Walgreens, McDonalds, and others; Microsoft's leak of business users' contacts from the cloud; and Gawker's loss of users names, passwords, and site information, Mozilla has become the latest to fail to keep its users confidential data secure.

Chris Lyon, Director of Infrastructure Security at Mozilla, wrote users of its addons page to let them know it might have accidentally shared their encrypted passwords.  Writes Lyon:
Dear addons.mozilla.org user,
 
The purpose of this email is to notify you about a possible disclosure of your information which occurred on December 17th. On this date, we were informed by a 3rd party who discovered a file with individual user records on a public portion of one of our servers. We immediately took the file off the server and investigated all downloads. We have identified all the downloads and with the exception of the 3rd party, who reported this issue, the file has been download by only Mozilla staff. This file was placed on this server by mistake and was a partial representation of the users database from addons.mozilla.org. The file included email addresses, first and last names, and an md5 hash representation of your password. The reason we are disclosing this event is because we have removed your existing password from the addons site and are asking you to reset it by going back to the addons site and clicking forgot password. We are also asking you to change your password on other sites in which you use the same password. Since we have effectively erased your password, you don't need to do anything if you do not want to use your account. It is disabled until you perform the password recovery.

 

We have identified the process which allowed this file to be posted publicly and have taken steps to prevent this in the future. We are also evaluating other processes to ensure your information is safe and secure.

 

Should you have any questions, please feel free to contact the infrastructure security team directly at infrasec@mozilla.com. If you are having issues resetting your account, please contact amo-admins@mozilla.org. We apologize for any inconvenience this has caused.

 

Chris Lyon

Director of Infrastructure Security

Worse yet, it turns out that the file contained passwords protected by an older hashing algorithm MD5, without any salting (random input to protect against dictionary attacks).  Writes Lyon in his blog:
The database included 44,000 inactive accounts using older, md5-based password hashes. We erased all the md5-passwords, rendering the accounts disabled. All current addons.mozilla.org accounts use a more secure SHA-512 password hash with per-user salts. SHA-512 and per user salts has been the standard storage method of password hashes for all active users since April 9th, 2009.
In other words, active users likely don't have much to worry about, but if you created an account in the past, which you haven't used in some time, it's likely that malicious parties may have at least your name and email address.  And if your password is weak, they'll likely soon have that as well -- so users who fall into this category might want to immediately change any identical passwords on accounts on other sites.

For those confused what these accounts even are, Mozilla encourages users of its popular extensions/add-ons to register.  According to Mozilla:
You only need to register if:
  • You want to submit reviews for add-ons
  • You want to keep track of your favorite add-on collections or create one yourself
  • You are an add-on developer and want to upload your add-on for hosting on AMO
Judging by the number of inactive accounts, many of Mozilla's millions of users decided to take the plunge and create an account.  Now some of those users' security may be at risk due to the organization careless post of user account information to a public server.

Given that a third party noticed and reported this file was available, it's safe to assume that someone preserved a copy of it.  And just like that, Mozilla became the latest to allow its users to become the victim of a security bungle.


Comments     Threshold


This article is over a month old, voting and posting comments is disabled

This is a complete non-issue.
By ThePooBurner on 12/28/2010 10:54:45 AM , Rating: 3
quote:
We have identified all the downloads and with the exception of the 3rd party, who reported this issue, the file has been download by only Mozilla staff.


Nothing has been leaked. This story could have gone entirely unwritten. Especially since all the accounts were disabled. And they were all old inactive accounts that haven't been used in a year and a half.




RE: This is a complete non-issue.
By kmmatney on 12/28/2010 12:29:32 PM , Rating: 4
The issue is that a lot of these users might be using the same username/passwords they use for other websites. So someone can start trying out these user names at Paypal, Bank sites, etc...


RE: This is a complete non-issue.
By ThePooBurner on 12/28/2010 12:46:14 PM , Rating: 3
Except n one has them . That's the point. If nothing actually got out into the wild, then no one is actually at risk.


RE: This is a complete non-issue.
By Lerianis on 12/28/2010 2:00:24 PM , Rating: 2
Good point. If it was only Mozilla and one "third party" who Mozilla immediately took seriously and fixed the problem with their website who were able to download this.... total non-issue, I agree.

I'm usually harsh on this, but this is the epitome of a non-issue.


RE: This is a complete non-issue.
By tastyratz on 12/29/2010 12:35:17 AM , Rating: 2
So it appears and so we hope, but the person who might have reported it might also be the sole controller of a list which has a value. It only has to be downloaded once to have been leaked. Manning was just 1 person too...

Kudos to Mozilla for disclosure even if it is low risk.


"This is from the DailyTech.com. It's a science website." -- Rush Limbaugh














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki