CloudBleed is the unofficial name for a security issue that was discovered in 17 February of 2017 and hits Cloudflare reverse proxies.
For those who don't know Cloudflare is one of the biggest companies offering CDN, DDOS protection, technologies website performance optimization, dedicated SSL and more. Cloudflare's services are used by more than 5,5 million websites according to the company. SecNews.gr is one of them.
Basic service is offered for free, but webmasters, organizations and large companies can upgrade for additional features and better protection.
The CloudBleed security loophole allowed servers to run "past the end of a buffer" that returned memory containing personal information. This information includes HTTP cookies, authentication tokens, HTTP Post bodies, and other sensitive data.
The subject was revealed by a researcher Google Project Zero, and has already been defined by Cloudflare.
The problem for Internet users is that the cookies they use to connect to these sites or other data may have been leaked. Although the problem has been fixed, search engines still have cached data, and attackers could collect it.
When Google announced the vulnerability to Cloudflare, it alerted other search engines warning them to clear cached search results. So search engines have reportedly "mixed up" cached data, but that does not mean that there is still no sensitive information available on the Internet.
It would be best to change passwords to all Cloudflare sites and services. This is of course not easy and it is rather time consuming to find out if the services and sites you visit use Cloudflare.
There is currently a list of one of his users GitHub which displays all sites that use Cloudflare services. Some of them: Patreon, 4chan, Medium, Bitpay, News.ycombinator.com, uber.com, Yelp.com, uber.com and Greek Public.gr.
The online tool DoesItUseCloudflare it will also answer any of your questions about pages that you want to see if their data has leaked.
What about SecNews?
SecNews.gr visitors do not have to worry because they do not have any accounts on the site. The authors and administrators of the page, in addition to having already changed their passwords, use 2FA for each link on the site.
Visitors and members (who have an account) of large shopping websites using the CloudFlare service will need to change passwords immediately, and if they are given the ability to use two-factor authentication.
To easily check which pages are using Cloudflare you can use one add-on for Firefox and Chrome. The CloudBleed is designed by the developer of NoSquint Plus, and will analyze the history tourof your browser to reveal any site pages Cloudflare uses.
This will allow you to find the pages considered dangerous data leakage and change your passwords.
Download the Add-on