CloudBleed is the unofficial name for a security issue that was discovered in 17 February of 2017 and hits Cloudflare reverse proxies.
For those who do not know Cloudflare is one of the largest companies offering CDN, protection against DDOS attacks, web page optimization technologies, dedicated SSL and more. Cloudflare services are used by more than 5,5 million websites according to the company. SecNews.gr is one of them.
Basic service is offered for free, but webmasters, organizations and large companies can upgrade for additional features and better protection.
The CloudBleed security flaw allowed servers to run “past the end of a buffer” που επέστρεφε memory που περιείχε προσωπικές πληροφορίες. Μεταξύ των πληροφοριών αυτών είναι τα HTTP cookies, authentication tokens, HTTP Post bodies, και άλλα ευαίσθητα δεδομένα.
The subject was revealed by a researcher Google Project Zero, and has already been defined by Cloudflare.
The problem for Internet users is that the cookies they use to link to these sites or other data may have leaked. Although the problem has been fixed, the search engines have temporary data stored, and the intruders could collect them.
When Google notified Cloudflare of the vulnerability, it alerted other search engines to clear their cached search results. So the search engines allegedly "mixed" the cached data, but that doesn't mean that there isn't still sensitive information free in the Internet.
It would be best to change passwords to all Cloudflare sites and services. This is of course not easy and it is rather time consuming to find out if the services and sites you visit use Cloudflare.
There is currently a list of one of his users GitHub which displays all sites that use Cloudflare services. Some of them: Patreon, 4chan, Medium, Bitpay, News.ycombinator.com, uber.com, Yelp.com, uber.com and Greek Public.gr.
The online tool DoesItUseCloudflare it will also answer any of your questions about pages that you want to see if their data has leaked.
What about SecNews?
SecNews.gr visitors do not have to worry because they do not have any accounts on the site. The authors and administrators of the page, in addition to having already changed their passwords, use 2FA for each link on the site.
Visitors and members (who have an account) of large shopping websites using the CloudFlare service will need to change passwords immediately, and if they are given the ability to use two-factor authentication.
To easily check which pages are using Cloudflare you can use an add-on for Firefox and Chrome. The CloudBleed έχει σχεδιαστεί από τον προγραμματιστή του NoSquint Plus, και θα αναλύσει το ιστορικό περιήγησης του προγράμματος περιήγησης σας για να αποκαλύψει οποιαδήποτε σελίδα τοποθεσία uses Cloudflare.
This will allow you to find the pages considered dangerous data leakage and change your passwords.
Download the Add-on