2 April 2024

OWASP Foundation discloses data breach due to Wiki web server misconfiguration


OWASP Foundation discloses data breach due to Wiki web server misconfiguration

OWASP Foundation, a US-based non-profit organization that supports the OWASP (The Open Worldwide Application Security Project) infrastructure and projects, has disclosed a security incident that affected member resumes.

The data breach, which occurred in late February 2024, was caused by a misconfiguration of OWASP’s old Wiki web server. The incident impacted the personally identifiable information (PII) of OWASP members from 2006 to around 2014 who provided their resumes as part of joining OWASP.

The affected data includes names, email addresses, phone numbers, physical addresses and other personal information, the foundation said in a short data breach notice.

In response to the breach, OWASP disabled directory browsing, reviewed the web server and Media Wiki configuration for other security issues, removed the resumes from the wiki site altogether, and cleared the CloudFlare cache to prevent further access. It has also requested that the information be deleted from the Web Archive.

OWASP said it “collected resumes as part of the early membership process, whereby members were required in the 2006 to 2014 era to show a connection to the OWASP community.” The organization assured that it no longer collects resumes as part of the membership process.

Back to the list

Latest Posts

Cyber Security Week in Review: May 24, 2024

Cyber Security Week in Review: May 24, 2024

In brief: Google fixes Chrome zero-day, a backdoor found in JAVS software, and more.
24 May 2024
Chinese APTs increasingly using ORB networks to mask attack infrastructure

Chinese APTs increasingly using ORB networks to mask attack infrastructure

Mandiant reports that it is actively monitoring several ORB networks, with the most notable being SPACEHOP and FLORAHOX.
23 May 2024
Threat actors exploit vulnerable drivers to disable EDRs in cryptojacking attack

Threat actors exploit vulnerable drivers to disable EDRs in cryptojacking attack

Ghostengine deploys several modules to tamper with security tools, establish a backdoor, and ensure software updates are in place.
22 May 2024