TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Apache Struts Statement on Equifax Security Breach

158 pointsby Randgaltover 7 years ago

9 comments

mevileover 7 years ago
The problem is that Equifax put within webserver&#x27;s reach information that had no business being there. Apache Strut&#x27;s vulnerability is unfortunate, but it shouldn&#x27;t have been the keys to the kingdom, where the kingdom is the personal information of nearly the entire US adult population with a credit history. If I knew a service relied only on the security of a web server to protect deeply personal information such as my name and SSN I&#x27;d never sign up. We didn&#x27;t have that choice with Equifax.<p>Having said that, definitely keep up on the vulnerabilities of software you use. It&#x27;s hard though, especially when you&#x27;re relying on a great deal of dependencies. A company the size of Equifax should have had a team dedicated to this. A team. It doesn&#x27;t seem like they had anyone who knew anything about basic security at all.
评论 #15207717 未加载
评论 #15207797 未加载
评论 #15208305 未加载
评论 #15208526 未加载
评论 #15208249 未加载
评论 #15208457 未加载
评论 #15208809 未加载
评论 #15208272 未加载
评论 #15208270 未加载
smailiover 7 years ago
<i>Our general advice to businesses and individuals utilizing Apache Struts as well as any other open or closed source supporting library in their software products and services is as follows:<p>1. Understand which supporting frameworks and libraries are used in your software products and in which versions. Keep track of security announcements affecting this products and versions.<p>2. Establish a process to quickly roll out a security fix release of your software product once supporting frameworks or libraries needs to be updated for security reasons. Best is to think in terms of hours or a few days, not weeks or months. Most breaches we become aware of are caused by failure to update software components that are known to be vulnerable for months or even years.<p>3. Any complex software contains flaws. Don&#x27;t build your security policy on the assumption that supporting software products are flawless, especially in terms of security vulnerabilities.<p>4. Establish security layers. It is good software engineering practice to have individually secured layers behind a public-facing presentation layer such as the Apache Struts framework. A breach into the presentation layer should never empower access to significant or even all back-end information resources.<p>5. Establish monitoring for unusual access patterns to your public Web resources. Nowadays there are a lot of open source and commercial products available to detect such patterns and give alerts. We recommend such monitoring as good operations practice for business critical Web-based services.</i>
评论 #15207652 未加载
评论 #15208313 未加载
评论 #15208302 未加载
gedyover 7 years ago
This is not Struts&#x27; &quot;fault&quot;... An entity like Equifax cannot hold such private info and power over our finances, then not have multiple layers of protection to prevent this. You expect bugs in user faceing software, so you protect against breaches so that you don&#x27;t expose 140 MILLION damn records..
评论 #15207726 未加载
orange_countyover 7 years ago
Apache brings up a good point about having layers of security. I wonder how Equifax was storing the data. Was it just plain text files?
solomatovover 7 years ago
As a Java developer, this gives me the lesson not to use smart meta programming facilities, like reflection, where possible. You reduce amount of code, but at the cost of making your protocols injectable to arbitrary code often in unobvious ways.
评论 #15211374 未加载
idibidiartover 7 years ago
PCI anyone?
0xbearover 7 years ago
Not The Onion: Equifax&#x27;s &quot;chief security officer&quot; majored in Music Composition: <a href="https:&#x2F;&#x2F;www.linkedin.com&#x2F;in&#x2F;susan-m-93069a&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.linkedin.com&#x2F;in&#x2F;susan-m-93069a&#x2F;</a>. How did she even get this job?
评论 #15209132 未加载
评论 #15209192 未加载
评论 #15208640 未加载
评论 #15208580 未加载
throwaway699552over 7 years ago
Interesting to also note that the &quot;workaround&quot; listed in the first announcement by the Apache Struts team was wrong. I followed the directions and my web application was still vulnerable. They have since updated it, but without an announcement.
yogthosover 7 years ago
I think this highlights the general problem of Java EE style architecture. There are many moving pieces and many permutations of how they interact together. It&#x27;s practically impossible to understand it in its entirety, and thus impossible to guarantee that it&#x27;s secure. You&#x27;re basically plugging holes as you find them, but you&#x27;re never sure that there aren&#x27;t more holes you don&#x27;t know about.
评论 #15207971 未加载
评论 #15207865 未加载
评论 #15207755 未加载
评论 #15207825 未加载
评论 #15207779 未加载
评论 #15209202 未加载
评论 #15207749 未加载
评论 #15207702 未加载