{"id":291,"date":"2005-07-18T23:05:15","date_gmt":"2005-07-18T16:05:15","guid":{"rendered":""},"modified":"2005-07-18T23:05:15","modified_gmt":"2005-07-18T16:05:15","slug":"firefox-marketing-site-hacked","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2005\/07\/firefox-marketing-site-hacked\/","title":{"rendered":"Firefox marketing site hacked"},"content":{"rendered":"<p>Attackers broke into the Web site by exploiting an unpatched security vulnerability in the software that runs SpreadFirefox.com, the Mozilla Foundation said in an e-mail alert to registered users of the site late Thursday. Mozilla coordinates Firefox development and marketing. The authenticity of the e-mail was confirmed Friday by a Mozilla representative.<!--more--><\/p>\n<p>The attack actually occurred on Sunday but was not discovered until Tuesday, according to the e-mail alert. The SpreadFirefox.com was subsequently taken down for a few days to investigate the attack, according to a notice posted on the site.<\/p>\n<p>The necessary patches have now been applied to the software that runs SpreadFirefox.com, Mozilla said. According to its e-mail, the group has also &#8220;reviewed our security plan to determine why we didn&#8217;t previously apply those fixes in this case, and have modified that plan to ensure we do so in the future.&#8221; The exploited flaw was a vulnerability in PHP, the language in which Drupal, the content management system that Spread Firefox uses, is written.<\/p>\n<p>Mozilla believes the machine was hacked to use it to send spam, according to the e-mail. However, it is possible that attackers obtained usernames and passwords and any other information people may have provided to the site, such as e-mail and home addresses, birth dates and instant-messaging names, Mozilla said.<\/p>\n<p>The hack is an embarrassment to Mozilla, which uses security as the main selling point for the Firefox Web browser.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SpreadFirefox.com, the community marketing Web site for the open-source Firefox Web browser, was hacked earlier this week, potentially exposing user data.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-291","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-4H","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}