Flaw in vBulletin add-on leads to Ubuntu Forums database breach

Hackers stole 2 million usernames and associated email addresses, but no passwords

Ubuntu support forums users should be on the lookout for dodgy emails after the website's database of 2 million email addresses was stolen.

Canonical announced the security breach on Friday after being notified that someone was claiming to have a copy of the UbuntuForums.org database. An investigation revealed that an attacker did get access to the website's user records through a vulnerability.

The exploited SQL injection flaw was located in the Forum Runner add-on for vBulletin, commercial web forum software that powers over 100,000 community websites on the Internet and is especially popular with companies. The vulnerability was known, but the Canonical IS team had failed to apply the patch for it in a timely manner.

"The attacker had the ability to inject certain formatted SQL to the Forums database on the Forums database servers," the team said in a blog post. "This gave them the ability to read from any table but we believe they only ever read from the 'user' table."

The user table contained usernames, email addresses and Internet Protocol addresses for 2 million users. It did not contain valid user passwords, but hashed strings that were used for the Ubuntu Single Sign On service. These cannot be used as is to access user accounts.

As a precautionary measure to ensure that no attacker code was left behind, Canonical temporarily took the website down, rebuilt its hosting servers from scratch, installed the most up to date version of vBulletin and reset all system and database passwords.

The company is certain that the attacker was not able to access any code repositories or update mechanisms, did not get write permissions to the Ubuntu Forums database, didn't obtain shell access any of the servers and was not able to mess around with any other Canonical or Ubuntu services.

While there is no immediate danger to Ubuntu Forums accounts, users should be wary of potential spam and phishing emails that might attempt to distribute malware. Attackers typically launch such attacks following large data breaches, since they can take advantage of known relationships between users and the compromised websites.

Ubuntu Forums is not the first large vBulletin-powered website to be compromised. Attackers hacked the MacRumors.com and vBulletin.com forums back in 2013 and Ubuntu Forums itself is at the second major database breach.

Website administrators should always make sure to keep their content management systems up to date, including all third-party add-ons, themes and components they used when building them.

Join the CSO newsletter!

Error: Please check your email address.

More about Ubuntu

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place