Feeds

Breach on Fort Apache.org exposes passwords

Open-sourcers disclose three-day intrusion

Intelligent flash storage arrays

Hackers penetrated the heavily-fortified servers for Apache.org in a "direct, targeted attack" that captured the passwords of anyone who used the website's bug-tracking service over a three-day span last week.

The breach, the second to hit Apache.org in eight months, also exposed a much larger list of passwords belonging to people who accessed the site's bug-tracking section. While the databases used a one-way hash to disguise the passwords, two of the lists are vulnerable to dictionary attacks because Atlassian, the maker of issue-tracking software used by Apache, failed to add "random salt" to them.

As a result, Apache officials said users who logged in to the bug section of the website from April 6 to April 9 "should consider the password as compromised, because the attackers changed the login form to log them." They also warned that there's a high risk of compromise to other users if they employed simple passwords based on dictionary words.

The intrusion began on April 5 when unknown attackers using a hacked server from Slicehost opened a new bug report on Apache.org. The post contained a shortened web link from tinyurl.com that exploited an XSS, or cross-site scripting, vulnerability on Apache's support website.

The hole was the result of a bug in JIRA, the issue-tracking software made by a company called Atlassian. The exploit was designed to steal session cookies used to authenticate people logged in to Apache's JIRA system. When several Apache administrators following the fraudulent bug report clicked on the on the malicious link, their JIRA administrator rights were then compromised.

The attackers also carried out a brute-force attack that flooded the site with hundreds of thousands of password combinations. By April 6, one of the two methods allowed the attackers to gain full administrative rights on the JIRA system. For three days, the hackers used their powers to copy users' home directories and files and to install a program that logged the passwords of anyone accessing the system.

Eventually, the attackers were able to obtain full root access for the server that administered the issue-tracking software. By pilfering cached authentication credentials stored on the machine, they were then able to log on to minotaur.apache.org, Apache's main shell server. The hackers' luck eventually ran out when they were unable to escalate the limited privileges that came with the compromised accounts on the minotaur server.

The breach coincided with a separate attack on Atlassian's internal servers that exposed a database storing user passwords in plain-text. Atlassian said here that the credentials created after July 2008 weren't included, but that the "old database table was not taken offline or deleted, and it is this database table that we believe could have been exposed during the breach.

The disclosure took many Atlassian customers by alarm.

"In my particular case I would not be horribly upset by someone accessing my project management or documentation, but access to my issues and source code would be disastrous for my business," one user wrote.

"For me, its unbelievable, that a company that sells secure login and user management solutions saves passwords in plaintext," another wrote.

As was the case in September, when Apache disclosed its servers were breached by hackers exploiting poorly locked-down secure shell keys, officials released a postmortem that's commendable for its thoroughness and refusal to pass the buck.

"The primary problem with our JIRA install is that the JIRA daemon runs as the user who installed JIRA," they wrote. "In this case, it runs as a jira role-account. There are historical reasons for this decision, but with 20/20 hindsight, and in light of the security issues at stake, we expect to revisit the decision!"

They noted other mistakes, including the use of the same password that gave access to a JIRA account and sudo rights on the host machine, inconsistent application of one-time passwords and the use of SSH passwords to log in over the net.

Apache's admission of fault is all the more admirable considering the epic blunder made by the folks at Atlassian, which most likely is the chink that gave the attackers access in the first place. A lesser group would have hid behind it. Instead, Apache came clean. The postmortem is here. ®

Remote control for virtualized desktops

More from The Register

next story
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.