These forums are CLOSED. Please visit the new forums HERE
Security Breach Because of SL Blog? |
|
Uma Bauhaus
Renascene
![]() Join date: 18 Aug 2004
Posts: 636
|
09-08-2006 23:06
Someone on Slashdot stated that the SL Blog runs on the same MySQL cluster where the main-account passwords and payment information resides. Was the zero-day exploit that led to the release of our information one that targeted the blog?
_____________________
The prophecy is true! At the end of the forums, Prok shall be born again and take the believers up to a holy forum while the sinners are forced to post comments in Linden blogs!
|
Aaron Levy
Medicated Lately?
![]() Join date: 3 Jun 2004
Posts: 2,147
|
09-08-2006 23:10
Oh, that would be so ironic. Entertainingly so.
_____________________
|
Carbon Breed
lol furry
![]() Join date: 23 Jan 2006
Posts: 119
|
09-08-2006 23:18
Oh, that would be so ironic. Entertainingly so. Two issues. Both front page diggs. But imagine if it turns out they were related. Wow. |
Uma Bauhaus
Renascene
![]() Join date: 18 Aug 2004
Posts: 636
|
09-08-2006 23:33
Wow. I've found that LL uses Wordpress for their blog. I'm searching around for recent exploits now. If anyone knows of a site that might list Wordpress exploits, post it here. _____________________
The prophecy is true! At the end of the forums, Prok shall be born again and take the believers up to a holy forum while the sinners are forced to post comments in Linden blogs!
|
Joshua Nightshade
Registered dragon
![]() Join date: 12 Oct 2004
Posts: 1,337
|
09-08-2006 23:35
Someone on Slashdot stated that the SL Blog runs on the same MySQL cluster where the main-account passwords and payment information resides. Was the zero-day exploit that led to the release of our information one that targeted the blog? I would pee myself into oblivion. That would be fantastic. _____________________
![]() Visit in-world: http://tinyurl.com/2zy63d http://shop.onrez.com/Joshua_Nightshade http://joshuameadows.com/ |
Uma Bauhaus
Renascene
![]() Join date: 18 Aug 2004
Posts: 636
|
09-08-2006 23:43
I found information on a WordPress Paged Parameter SQL Injection Vulnerability which can be seen in detail here. It looks like it affects WordPress 2.0.2 through 2.0.5. Could this be it? I don't know enough about WordPress, SQL, or security to do anything more than speculate.
Comments from experts would be much appreciated. ![]() _____________________
The prophecy is true! At the end of the forums, Prok shall be born again and take the believers up to a holy forum while the sinners are forced to post comments in Linden blogs!
|
Albert Wake
Registered User
Join date: 5 Jan 2006
Posts: 25
|
09-08-2006 23:46
I would pee myself into oblivion. That would be fantastic. Awww man you just screwed up your lovely and neat looking 1000 posts, ah well. Well an sql injection attack in the post comment bit might have been a possible one. I dunno the details though but I found this and anyway probably best not to post hacking bits and bobs http://unknowngenius.com/blog/archives/2006/07/26/critical-announcement-to-all-wordpress-users/ and open registration without verification could be plausable as 'guest' account. Don't quote me on that though. |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
09-08-2006 23:56
I found information on a WordPress Paged Parameter SQL Injection Vulnerability which can be seen in detail here. It looks like it affects WordPress 2.0.2 through 2.0.5. Could this be it? I don't know enough about WordPress, SQL, or security to do anything more than speculate. Comments from experts would be much appreciated. ![]() http://www.securityfocus.com/archive/1/445604/30/0/threaded _____________________
"People can cry much easier than they can change."
-James Baldwin |
Ordinal Malaprop
really very ordinary
![]() Join date: 9 Sep 2005
Posts: 4,607
|
09-09-2006 00:00
Awww man you just screwed up your lovely and neat looking 1000 posts, ah well. Well an sql injection attack in the post comment bit might have been a possible one. I dunno the details though but I found this and anyway probably best not to post hacking bits and bobs http://unknowngenius.com/blog/archives/2006/07/26/critical-announcement-to-all-wordpress-users/ and open registration without verification could be plausable as 'guest' account. Don't quote me on that though. No, that just refers to an account on Wordpress. Registration isn't open on the Lindenblog. Unless they've really hacked about with WP - and I can't see any indication that they have, it looks like the standard stuff to me - I doubt this has anything to do with it at all. |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
09-09-2006 00:01
No, that just refers to an account on Wordpress. Registration isn't open on the Lindenblog. Unless they've really hacked about with WP - and I can't see any indication that they have, it looks like the standard stuff to me - I doubt this has anything to do with it at all. Sshh! ![]() Random searching: http://dev.mysql.com/tech-resources/interviews/ian-wilkes-linden-lab.html _____________________
"People can cry much easier than they can change."
-James Baldwin |
cinda Hoodoo
my 2cents worth
Join date: 30 Dec 2004
Posts: 951
|
please someone splan to me...
09-09-2006 00:25
im a computer idiot, i know just enuff to be dangerous...what does this part mean from Robin's post earlier?
We have gathered a significant amount of information regarding the attack and the attacker. However, because the investigation is ongoing, we cannot provide very detailed information regarding the type of attack or identity of the attacker. We can disclose that the intrusion path took advantage of a "zero-day exploit" in third-party web software. |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
09-09-2006 00:30
im a computer idiot, i know just enuff to be dangerous...what does this part mean from Robin's post earlier? We have gathered a significant amount of information regarding the attack and the attacker. However, because the investigation is ongoing, we cannot provide very detailed information regarding the type of attack or identity of the attacker. We can disclose that the intrusion path took advantage of a "zero-day exploit" in third-party web software. "zero-day exploit"= A glitch (?) in their system that they used on the same day it was found, so it was very hard for them to catch it before it happened. (If I'm wrong, someone please correct me.) _____________________
"People can cry much easier than they can change."
-James Baldwin |
Jon Rolland
Registered User
Join date: 3 Oct 2005
Posts: 705
|
09-09-2006 00:54
I think we’re going to jump straight to Havok 3 and simply skip Havok 2 – we’re a bit behind on that one… I nominate this for Understatement of the Year. |
Vladamire McCellan
Registered User
Join date: 20 Aug 2006
Posts: 19
|
09-09-2006 02:36
"zero-day exploit"= A glitch (?) in their system that they used on the same day it was found, so it was very hard for them to catch it before it happened. (If I'm wrong, someone please correct me.) zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known. Ordinarily, after someone detects that a software program contains a potential exposure to exploitation by a hacker, that person or company can notify the software company and sometimes the world at large so that action can be taken to repair the exposure or defend against its exploitation. Given time, the software company can repair and distribute a fix to users. Even if potential hackers also learn of the vulnerability, it may take them some time to exploit it; meanwhile, the fix can hopefully become available first. With experience, however, hackers are becoming faster at exploiting a vulnerability and sometimes a hacker may be the first to discover the vulnerability. In these situations, the vulnerability and the exploit may become apparent on the same day. Since the vulnerability isn't known in advance, there is no way to guard against the exploit before it happens. Companies exposed to such exploits can, however, institute procedures for early detection of an exploit. Simply put, LL uses/used X software. X software had an exploitable security vulnerability that became known. Before the makers of X software could write a patch to take care of said security vulnerability, a hacker figured out a way to take advantige of it. |
Flugel Flasheart
Registered User
Join date: 27 Nov 2005
Posts: 18
|
09-09-2006 02:59
I do know that vBulletin uses MD5/Salt encryption and SL forums use an old version of vB 3.05, when it is now up to 3.6 following security updates. The forums are definitely linked to the main SL info as the password is carried across, so maybe this is how the breach occurred.
|
Belaya Statosky
Information Retrieval
![]() Join date: 3 Jun 2004
Posts: 552
|
09-09-2006 03:19
Actually, it was the software used for the SL Wiki, so I was told. MediaWikia has a superb trackrecord, but wasn't used. They're now using Lore.
|
Von Tripp
Registered User
Join date: 28 Apr 2006
Posts: 6
|
09-09-2006 03:29
Let me get this right. Linden Labs used public domain unvetted software on one of their web servers which had direct access to the main personal information database. They are idiots and if this happened at my company, both the IT director and the CTO would be fired on the spot. Heads must roll for such a basic IT security mistake with such major ramifications.
Any organisation storing customer information, has to compartmentalise the security systems, so that the web sites using public domain software only has access to the information that it needs, usually via a separate, one way, data feed. LL have probably broken the law in Britain by failing to compartmentalise their security of personal data correctly. There is something called the Data Protection Act here. |
Belaya Statosky
Information Retrieval
![]() Join date: 3 Jun 2004
Posts: 552
|
09-09-2006 03:34
Let me get this right... Copying and pasting between threads is awesome. |
Von Tripp
Registered User
Join date: 28 Apr 2006
Posts: 6
|
09-09-2006 03:40
Copying and pasting between threads is awesome. What gives with you? I moved my original post to a more appropriate thread and you jump on it. Got nothing better to do? Geez. |
Osgeld Barmy
Registered User
Join date: 22 Mar 2005
Posts: 3,336
|
09-09-2006 03:44
blah blahh in most cases your better off with open source software ie you write a script for whatever application, bug is found for your application, only a few billion possibilitys left vs a script to do an application, hard tested in the real world by litterly millions of ppl, 24 hours a day - 7 days a week hmmm ill take option #2 with offical docs LL have probably broken the law in Britain by failing to compartmentalise their security of personal data correctly. There is something called the Data Protection Act here. shit happens, if you can write a 100% hackproof datafarm please apply to linden labs for some posh san fran housing and free pinballl n coffee, if not.... |
Von Tripp
Registered User
Join date: 28 Apr 2006
Posts: 6
|
09-09-2006 03:46
in most cases your better off with open source software You missed the point. the data was all kept in the same place. Thats the problem... |
Flavian Molinari
Broadly Offensive Content
![]() Join date: 1 Aug 2004
Posts: 662
|
09-09-2006 03:47
I told you all, blogs suck.
_____________________
|
Von Tripp
Registered User
Join date: 28 Apr 2006
Posts: 6
|
09-09-2006 03:51
shit happens This is shit happens? Tell that to all the tee-ed off SL residents calling their credit card companies, changing paypal passwords etc etc. |
Flavian Molinari
Broadly Offensive Content
![]() Join date: 1 Aug 2004
Posts: 662
|
09-09-2006 03:53
This is shit happens? Tell that to all the tee-ed off SL residents calling their credit card companies, changing paypal passwords etc etc. I think he just did. _____________________
|
Osgeld Barmy
Registered User
Join date: 22 Mar 2005
Posts: 3,336
|
09-09-2006 03:53
You missed the point. the data was all kept in the same place. Thats the problem... by seperating data into individual resources you only delay the possibility, on my personal play domain i seperate info, but if some lamer wants to hack into my account its all over and my website is alll over the place as far as servers and geographical locations i dont personally think the level of security you expect == the level of flexibility the SL system provides in my 20 someodd years of BBS's and websites its always boiled down to... iron fisted pita systems noone wants to use, that are still open to some dork with way too much time on their hands and no love life or user avaible systems with the exact same issues least LL was smart enugh to segerate the CC info (to what extent is to be known) |