NASA employee data exposed for at least three weeks due to misconfigured web app

Names and email addresses accidentally made public in the second major security scare in as many months

Space walk

A misconfigured app exposed NASA employees' personal details including their names and email address, as well as details about ongoing projects within the space agency.

Incorrectly-set permissions within Jira, a piece of web-based software used by organisations to monitor workflow and internal issues, exposed a bulk of internal data for at least three weeks last year, according to security researcher Avinash Jain.

These details could have been accessed by anybody over the internet with just the right URL over at-least a three week period and could have aided an attacker in gaining access to the wider application.

Jain claimed a system administrator may have misunderstood the definition of "all users" and "everyone" when assigning permissions to newly-created dashboards within the app, interpreting these terms to mean everyone within the organisation.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Due to these misconfigured global permissions scheme, the data exposed extended to all NASA employees' names and email addresses, their roles as assigned to projects listed on Jira, as well as current NASA projects and upcoming milestones.

Alongside an issue that allowed members of the public to browse a full list of employees, a separate filter misconfiguration exposed how projects and tasks are categorised within NASA, and who oversees them.

"This will likely not be a complete list of users like the browse users function, but can glean useful information about how usernames are formatted," Jain wrote in his report.

"Additionally, it can give an attacker an idea of what kind of information may be housed within the application and what projects team is working upon along with showing features of different projects."

Jain reported the bug to the NASA Security Operations Centre (SOC) and the US-Computer Emergency Readiness Team (US-CERT) on 3 September 2018 and received word the issue had been resolved three weeks later on 25 September.

He then informed both agencies of his intention to disclose the incident publicly a few weeks later on 9 November.

Advertisement - Article continues below

This is the second major security scare NASA has sustained in recent months after malicious actors breached a server in October last year and stole highly sensitive employee information. There are no suggestions these two incidents are connected.

Featured Resources

Transform the operator experience with enhanced automation & analytics

Bring networking into the digital era

Download now

Artificially intelligent data centres

How the C-Suite is embracing continuous change to drive value

Download now

Deliver secure automated multicloud for containers with Red Hat and Juniper

Learn how to get started with the multicloud enabler from Red Hat and Juniper

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/data-insights/big-data/354311/google-reveals-uks-most-searched-for-terms-in-2019
big data

Google reveals UK’s most searched for terms in 2019

11 Dec 2019