Latest news of the domain name industry

Recent Posts

Dumb ICANN bug revealed secret financial data to new gTLD applicants

Kevin Murphy, April 30, 2015, 17:00:31 (UTC), Domain Registries

Secret financial projections were among 330 pieces of confidential data revealed by an ICANN security bug.

Over the last two years, a total of 19 new gTLD applicants used the bug to access data belonging to 96 applicants and 21 registry operators.

That’s according to ICANN, which released the results of a third-party audit this afternoon.

Ashwin Rangan, ICANN’s new chief information and innovation officer, confirmed to DI this afternoon that the data revealed to unauthorized users included private financial and technical documents that gTLD applicants attached to their applications.

It would have included, for example, documents that dot-brand applicants reluctantly submitted to demonstrate their financial health.

But Rangan said it was not clear whether the glitch had been exploited deliberately or accidentally.

While saying the situation was “very deeply regrettable”, he added that applicant data deemed confidential when it was submitted back in 2012 may not be considered as such today.

The vulnerability was in ICANN’s Global Domains Division Portal, which was taken offline for three days at the end of February and early March after the bug was reported by a user.

Two outside consulting firms were brought in to scan access logs going back to the launch of the new gTLD portal back in April 2013.

What they found was that any user of the portal could access any attachment to any application, whether it belonged to them or a third-party applicant, simply by checking a radio button in the advanced search feature.

It was a misconfiguration by ICANN of the Salesforce.com software used by GDD, rather than a coding error, Rangan said.

“The public/private data sharing setting can be On or Off and here it was set to On,” he said.

On 330 occasions, starting “in earliest part of when the portal first became available” two years ago, these 19 users would have been exposed to data they were not supposed to be able to see.

The audit has been unable to determine whether the users actually downloaded confidential data on those occasions.

What’s confirmed is that only new gTLD applicants were able to use the glitch. No third-party hackers were involved.

The 19 users who, whether they meant to or not, exploited this vulnerability are now going to be sent letters asking them to explain themselves. They’ll also be asked to delete anything they downloaded and to not share it with third parties.

Before May 27, ICANN will also contact those applicants whose secret data was exposed, telling them which rival applicants could have seen it.

Rangan said that there have been almost 600,000 GDD sessions in the last two years, and that only 36 of them revealed data to unauthorized users.

“It’s a small fraction,” he said. “The question is whether they just stumbled across something they were not even aware of… Looking at the log files it is not clear what is the case.”

ICANN seems to be giving the 19 users the benefit of the doubt so far, but still wants them to explain their actions.

As CIO, Rangan was not able to comment on whether the breach exposes ICANN or applicants to any kind of legal liability.

It’s not the first time sensitive applicant data has been exposed. Back in 2012, DI discovered that the home addresses of the directors of applicants had been published, despite promises that they would remain private.

At the time of the original GDD portal misconfiguration, ICANN had noted security expert Jeff “The Dark Tangent” Moss as its chief security officer.

Earlier this week, ICANN’s board of directors authorized expenses of over $500,000 to carry out security audits of ICANN’s code.

Tagged: , , ,

Comments (6)

  1. Avri Doria says:

    For the sake of transparency I hope the names of those applications that did access the data are released. Let them explain themselves to the community. Let them make their explanations to the court of public opinion.

    avri

  2. Reg says:

    +1, Avri.

  3. Peter Lynch says:

    The applicants who have had their files breached should receive notification. Period.

    • Kevin Murphy says:

      They will before May 27, according to ICANN.

    • Rubens Kuhl says:

      I’ ve only got the “your data was not viewed” messages, but it seems from the release that ICANN wouldn’t reveal today to those who have been viewed, by whom.

      If any of the applications were among those 96, I would immediately reply with a formal request for ICANN to identify who viewed the specific set of data.

  4. Acro says:

    All your data belongs to ICANNT.

Add Your Comment