Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Wednesday March 22 2017, @05:14AM   Printer-friendly
from the bad-sysadmin,-no-biscuit dept.

The operator of a website that accepts subscriber logins only over unencrypted HTTP pages has taken to Mozilla's Bugzilla bug-reporting service to complain that the Firefox browser is warning that the page isn't suitable for the transmission of passwords.

"Your notice of insecure password and/or log-in automatically appearing on the log-in for my website, Oil and Gas International, is not wanted and was put there without our permission," a person with the user name dgeorge wrote here (the link was made private shortly after this post went live). "Please remove it immediately. We have our own security system, and it has never been breached in more than 15 years. Your notice is causing concern by our subscribers and is detrimental to our business."

Around the same time this post was going live, participants of this Reddit thread claimed to hack the site using what's known as a SQL injection exploit. Multiple people claimed that passwords were stored in plaintext rather than the standard practice of using cryptographic hashes. A few minutes after the insecurity first came up in the online discussion, a user reported the database was deleted. Ars has contacted the site operator for comment on the claims, but currently Ars can't confirm them. The site, http://www.oilandgasinternational.com, was displaying content as it did earlier at the time this post was being updated.

As a member of the Mozilla developer team pointed out in reply to the complaint, both Firefox and Chrome routinely issue warnings whenever users encounter a login page that's not protected by HTTPS encryption. The warnings became standard earlier this year.

The site in question appears to be completely offline at this time.

Source: ArsTechnica


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Justin Case on Thursday March 23 2017, @01:12AM (2 children)

    by Justin Case (4239) on Thursday March 23 2017, @01:12AM (#483033) Journal

    Also, I know your request is not serious, but if it were, accepting a script from some random stranger in the Internet for maintaining https on your website is a sure sign of gross incompetence, the type that should get you fired and lifetime blacklisted.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by The Mighty Buzzard on Thursday March 23 2017, @10:22AM (1 child)

    by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 23 2017, @10:22AM (#483156) Homepage Journal

    accepting a script from some random stranger in the Internet for maintaining https on your website is a sure sign of gross incompetence

    You need to blacklist yourself then because I guarantee you have done this for your system init jobs. Unless you think sending in a pull request to $distro somehow makes them not a random stranger anymore.

    Being able to read the script makes its origin irrelevant. Not being able to read a dozen or two lines of straight-forward shell scripting, now that should get you blacklisted from ever admining anything.

    --
    My rights don't end where your fear begins.
    • (Score: 2) by Justin Case on Thursday March 23 2017, @03:01PM

      by Justin Case (4239) on Thursday March 23 2017, @03:01PM (#483235) Journal

      I hear your point but I don't consider a well known, long established, peer vetted signed code repository "some random stranger".

      Yes, sometimes they do screw up, and it is widely discussed, and those who are paying attention know what to watch out for.

      It is like buying a sandwich from the sandwich shop vs. eating one you found lying on the sidewalk.