Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


Zepanda66

533 posts

Ultimate Geek


#242510 1-Nov-2018 09:37
Send private message

In case anyone was wondering why their site is offline. 

 

https://www.reddit.com/r/newzealand/comments/9si4um/psa_computerloungeconz_has_security_issues/ 

 

 

 

 





http://www.speedtest.net/result/7315955530.png


View this topic in a long page with up to 500 replies per page Create new topic
 1 | 2
plas
455 posts

Ultimate Geek


  #2117726 1-Nov-2018 10:22
Send private message

LOL awesome response by CL, they were notified months ago.

 

 

We are aware of this particular shortfall in our security and our web developers are currently working on a fix.

 

We have been speaking with BrianMcCarthyNZ (OP), and he has been informed that we are in the process of releasing a new site (which unfortunately has taken a bit longer than intended), that will certainly address the lack of security on the current website.

 

If you know how to find the vulnerability, we'd appreciate it if you would exercise restraint and not disclose any information that may assist in exploiting it, as it will help protect the data of our customers.

 

Thank you for your understanding :)

 




Coil
6614 posts

Uber Geek
Inactive user


  #2117733 1-Nov-2018 10:36
Send private message

plas:

 

LOL awesome response by CL, they were notified months ago.

 

 

We are aware of this particular shortfall in our security and our web developers are currently working on a fix.

 

We have been speaking with BrianMcCarthyNZ (OP), and he has been informed that we are in the process of releasing a new site (which unfortunately has taken a bit longer than intended), that will certainly address the lack of security on the current website.

 

If you know how to find the vulnerability, we'd appreciate it if you would exercise restraint and not disclose any information that may assist in exploiting it, as it will help protect the data of our customers.

 

Thank you for your understanding :)

 

 

 

 

 

So they have admitted to a fault and they are kindly asking for their exposed customer info to not be looked at and left alone.
Jeeze thats tempting. 


Bluntj
556 posts

Ultimate Geek


  #2117777 1-Nov-2018 11:56
Send private message

I am a regular customer and have been complaining about their dog of a website for sometime. Now I am a little concerned.




Lias
5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #2117787 1-Nov-2018 12:21
Send private message

If they'd responded quickly and dealt with this I wouldn't have an issue, but knowing about an issue like this for months and not taking action is just utterly unforgivable. 





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.


sorceror
163 posts

Master Geek


  #2117822 1-Nov-2018 13:09
Send private message

Coil:

 

plas:

 

LOL awesome response by CL, they were notified months ago.

 

 

We are aware of this particular shortfall in our security and our web developers are currently working on a fix.

 

We have been speaking with BrianMcCarthyNZ (OP), and he has been informed that we are in the process of releasing a new site (which unfortunately has taken a bit longer than intended), that will certainly address the lack of security on the current website.

 

If you know how to find the vulnerability, we'd appreciate it if you would exercise restraint and not disclose any information that may assist in exploiting it, as it will help protect the data of our customers.

 

Thank you for your understanding :)

 

 

 

 

 

So they have admitted to a fault and they are kindly asking for their exposed customer info to not be looked at and left alone.
Jeeze thats tempting. 

 

 

tempting enough to warrant criminal charges? because accessing this information would easily be illegal under s252 of the crimes act, even if the bug is obvious.


Lias
5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #2117947 1-Nov-2018 15:17
Send private message

sorceror:

 

tempting enough to warrant criminal charges? because accessing this information would easily be illegal under s252 of the crimes act, even if the bug is obvious.

 

 

IANAL, but I think you're very wrong on that.

 

 

252Accessing computer system without authorisation

 

(1) Every one is liable to imprisonment for a term not exceeding 2 years who intentionally accesses, directly or indirectly, any computer system without authorisation, knowing that he or she is not authorised to access that computer system, or being reckless as to whether or not he or she is authorised to access that computer system.

 

(2) To avoid doubt, subsection (1) does not apply if a person who is authorised to access a computer system accesses that computer system for a purpose other than the one for which that person was given access.

 

 

If you have a public website on the internet, you are authorising people to access content on it, and I'd strongly maintain that Section 252(2) then provides a complete defense when someone accesses content on that website that you didn't want or intend them to access. There was quite a lot of robust discussion of this a few years ago when Cameron Slater and Jason Ede discovered a vast wealth of confidential donation information sitting on one of Labour's public web servers in almost identical circumstances. The Greens laid a police complaint over it, and the police determined that no offence had been committed, which is about as close as we have to case law on the matter.





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.


sorceror
163 posts

Master Geek


  #2117953 1-Nov-2018 15:39
Send private message

Lias:

 

sorceror:

 

tempting enough to warrant criminal charges? because accessing this information would easily be illegal under s252 of the crimes act, even if the bug is obvious.

 

 

IANAL, but I think you're very wrong on that.

 

 

252Accessing computer system without authorisation

 

(1) Every one is liable to imprisonment for a term not exceeding 2 years who intentionally accesses, directly or indirectly, any computer system without authorisation, knowing that he or she is not authorised to access that computer system, or being reckless as to whether or not he or she is authorised to access that computer system.

 

(2) To avoid doubt, subsection (1) does not apply if a person who is authorised to access a computer system accesses that computer system for a purpose other than the one for which that person was given access.

 

 

If you have a public website on the internet, you are authorising people to access content on it, and I'd strongly maintain that Section 252(2) then provides a complete defense when someone accesses content on that website that you didn't want or intend them to access. There was quite a lot of robust discussion of this a few years ago when Cameron Slater and Jason Ede discovered a vast wealth of confidential donation information sitting on one of Labour's public web servers in almost identical circumstances. The Greens laid a police complaint over it, and the police determined that no offence had been committed, which is about as close as we have to case law on the matter.

 

 

not even close to identical circumstances - there's a big difference between just accessing information that is sitting on a web server vs exploiting a vulnerability by injecting malicious content which then gives you information from a database (and the DB may even potentially sit on another server). there is a large amount of case law on this, it just doesn't make it into the media.


 
 
 

Trade NZ and US shares and funds with Sharesies (affiliate link).
Lias
5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #2117962 1-Nov-2018 15:46
Send private message

sorceror:

 

not even close to identical circumstances - there's a big difference between just accessing information that is sitting on a web server vs exploiting a vulnerability by injecting malicious content which then gives you information from a database (and the DB may even potentially sit on another server). there is a large amount of case law on this, it just doesn't make it into the media.

 

 

Are you sure he's using SQL injection? Do you have detailed knowledge of how he's scraping the data, because based on his comments on Reddit it doesn't sound like that to me?





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.


sorceror
163 posts

Master Geek


  #2117980 1-Nov-2018 16:44
Send private message

no I don't know for certain - but I don't think it specifically has to be SQL injection, even if it was something like IDOR via a /user/<id number> URL, going through the IDs would still fall afoul of the act.

 

a hidden backup file you could possibly argue either way but this doesn't sound like that (because that could be fixed very quickly and easily).

 

the Labour party 'hack' was a webserver that just had the webroot exposed with directory listing and everything. so literally no exploits were required, you just click your way through. the directory structure was also indexed on google/multiple search engines. i very much doubt this was the case with CL (because again, that's fixed very easily).


Lias
5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #2117990 1-Nov-2018 17:25
Send private message

sorceror:

 

no I don't know for certain - but I don't think it specifically has to be SQL injection, even if it was something like IDOR via a /user/<id number> URL, going through the IDs would still fall afoul of the act.

 

a hidden backup file you could possibly argue either way but this doesn't sound like that (because that could be fixed very quickly and easily).

 

the Labour party 'hack' was a webserver that just had the webroot exposed with directory listing and everything. so literally no exploits were required, you just click your way through. the directory structure was also indexed on google/multiple search engines. i very much doubt this was the case with CL (because again, that's fixed very easily).

 

 

We're probably not going to agree on what the act covers, but given that the guy who found the vulnerability appears to be acting in an ethical fashion, I'd like to think he wouldn't be charged. If the NZ courts are finding people guilty for discovering and responsibly reporting vulnerabilities in public websites, then something is seriously broken with the legislation in that regard.

 

 





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.


sorceror
163 posts

Master Geek


  #2117996 1-Nov-2018 17:35
Send private message

Lias:

 

sorceror:

 

no I don't know for certain - but I don't think it specifically has to be SQL injection, even if it was something like IDOR via a /user/<id number> URL, going through the IDs would still fall afoul of the act.

 

a hidden backup file you could possibly argue either way but this doesn't sound like that (because that could be fixed very quickly and easily).

 

the Labour party 'hack' was a webserver that just had the webroot exposed with directory listing and everything. so literally no exploits were required, you just click your way through. the directory structure was also indexed on google/multiple search engines. i very much doubt this was the case with CL (because again, that's fixed very easily).

 

 

We're probably not going to agree on what the act covers, but given that the guy who found the vulnerability appears to be acting in an ethical fashion, I'd like to think he wouldn't be charged. If the NZ courts are finding people guilty for discovering and responsibly reporting vulnerabilities in public websites, then something is seriously broken with the legislation in that regard.

 

 

 

 

 

 

i would like to think so too, but in some cases in the past NZ Police have treated it as a strict liability offense - ie intent means squat. it definitely is broken and outdated legislation.


Zepanda66

533 posts

Ultimate Geek


  #2118316 2-Nov-2018 09:55
Send private message

Still down this morning. And no PSA on their social media. 





http://www.speedtest.net/result/7315955530.png


michaelmurfy
meow
13257 posts

Uber Geek

Moderator
ID Verified
Trusted
Lifetime subscriber

  #2118328 2-Nov-2018 10:18
Send private message

I really hope they've disabled the SQL service as their website is actually accessible from some links (see: http://www.computerlounge.co.nz/main/sitemap.asp) and could well be still exploitable.

 

But poor form for not notifying customers what the real story is. In cases like this a "Gray hat" dropping the users table would be the best outcome to ensure details are not actually stolen - see this thread on Reddit as an example of a case like this, specifically this:

 

Their database is now secure. Since the login form is vulnerable to SQL injection, someone dropped the OGIUser table, meaning that nobody can steal those passwords anymore.





Michael Murphy | https://murfy.nz
Referral Links: Quic Broadband (use R122101E7CV7Q for free setup)

Are you happy with what you get from Geekzone? Please consider supporting us by subscribing.
Opinions are my own and not the views of my employer.


Bluntj
556 posts

Ultimate Geek


  #2118373 2-Nov-2018 10:38
Send private message

They still havnt informed their online customers....extremely disappointing for a significant IT retailer.


Tracer
343 posts

Ultimate Geek


  #2118632 2-Nov-2018 15:57
Send private message

I emailed and asked for my account + details to be deleted. They politely replied stating they would do so, so hopefully they follow through.


 1 | 2
View this topic in a long page with up to 500 replies per page Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.