By Lucian Constantin
Jan. 6, 2017
The security team behind Plone, a content management system that powers many enterprise websites, has dismissed claims that hackers have access to information about an unpatched critical vulnerability.
The dismissal comes after a hacker who uses the online alias CyberZeist published a list of log-in credentials and hashed passwords that he claimed were obtained by hacking into the FBI.gov website by using a Plone zero-day exploit.
CyberZeist, who claims to act in the name of the Anonymous hacktivist movement, said in a post on Pastebin Monday that he didn't find the Plone vulnerability himself, but he was asked to test it out by the person who did.
The FBI website was supposedly selected as a target because it's publicly known that it runs on Plone. However, the hacker said that other websites, including those of the European Union Agency for Network and Information Security (ENISA) and the U.S. National Intellectual Property Rights Coordination Center (NIPRCC), were also vulnerable.
"I obviously cannot publish the 0day attack vector myself as it is being actively sold over [the] Tor network for bitcoins," the hacker said in his Pastebin post.
However, the Plone maintainers said in a blog post on the project's website that "the Plone security team has been aware of a recent claim, has examined it, and has determined that it is a hoax. There is no zero-day flaw in Plone nor in Plone-based distributions."
Matthew Wilkes, a member of the Plone security team, explained in an email message why the team believes both the vulnerability report and the FBI.gov hack are part of a hoax. According to him, there are many inconsistencies between the technical details released by the hacker and the way the open-source CMS works.
Plone is written mostly in Python and runs on top of Zone, a Python-based web application server. CyberZeist claimed that the FBI web server was running FreeBSD 6.2-RELEASE, a very old version of the FreeBSD operating system that dates back to 2007.
FreeBSD 6.2 only supports Python 2.4 and 2.5 and Plone does not run on such old versions of Python, Wilkes said.
The password hashes and salts that accompany the leaked FBI account names are not consistent with values that Plone would generate, suggesting that they were generated in bulk on another server, according to Wilkes. Furthermore, the leaked FBI email addresses match addresses that have been harvested from various sources over the years and are publicly available.
The hacker also claimed to have gathered the logins from backup files found on the web server that had the .bck file extension. The Plone database backup system does not generate files with that extension and the backups that it does generate are stored outside the webserver directories.