{"id":28232,"date":"2014-12-23T13:45:19","date_gmt":"2014-12-23T18:45:19","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/flaw-in-open-source-pdf-viewer-could-put-wikileaks-users-others-at-risk.php"},"modified":"2014-12-23T13:45:19","modified_gmt":"2014-12-23T18:45:19","slug":"flaw-in-open-source-pdf-viewer-could-put-wikileaks-users-others-at-risk","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/flaw-in-open-source-pdf-viewer-could-put-wikileaks-users-others-at-risk.php","title":{"rendered":"Flaw in open-source PDF viewer could put WikiLeaks users, others at risk"},"content":{"rendered":"<p><p>    An open-source component used    to display PDF files on WikiLeaks.org and other websites    contains vulnerabilities that could be exploited to launch    cross-site scripting (XSS) and content spoofing attacks against    visitors.  <\/p>\n<p>    The vulnerable component is    called FlexPaper and is developed by a company called Devaldi,    based in New Zealand. The company confirmed the issues, which        were first reported Thursday on the WikiLeaks supporters    forum, and released    FlexPaper 2.3.0 to address them.  <\/p>\n<p>    However, it seems that the    component hasnt yet been updated on WikiLeaks.org, which was    still using FlexPaper 2.1.2     on some pages Tuesday.  <\/p>\n<p>    The incident comes after    Wired reported last week that in 2012 the FBI used a    Flash-based component     to decloak Tor users and find their real IP (Internet    Protocol) addresses in an operation that targeted users of    child pornography websites hosted on the Tor network.  <\/p>\n<p>    Since WikiLeaks audience    includes a lot of users that value their privacy and anonymity,    any vulnerability in the site that could potentially be used to    expose their real location is likely to be viewed as a serious    threat.  <\/p>\n<p>    Given the fact that most    browsers use plugins to enable the reading of PDFs, we strongly    urge WikiLeaks to link directly to PDF files instead of using    third party software that could put users at risk, said a user    named Koyaanisqatsi, who reported the flaws on the WikiLeaks    forum.  <\/p>\n<p>    Thats what WikiLeaks did    with two secret documents about travelling through airports    using false ID that were allegedly leaked from the U.S. Central    Intelligence Agency. The site published the documents Sunday    and directly linked to the PDF files instead of displaying them    in an embedded viewer.  <\/p>\n<p>        Lucian Constantin writes about information security,        privacy, and data protection for the IDG News Service.        More by Lucian        Constantin      <\/p>\n<p>        Your message has been sent.      <\/p>\n<p>        There was an error emailing this page.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2862812\/flaw-in-opensource-pdf-viewer-could-put-wikileaks-users-others-at-risk.html\/RK=0\/RS=IQmOhTD0Tyzvz1tWa8X3E2KKAh8-\" title=\"Flaw in open-source PDF viewer could put WikiLeaks users, others at risk\">Flaw in open-source PDF viewer could put WikiLeaks users, others at risk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> An open-source component used to display PDF files on WikiLeaks.org and other websites contains vulnerabilities that could be exploited to launch cross-site scripting (XSS) and content spoofing attacks against visitors. The vulnerable component is called FlexPaper and is developed by a company called Devaldi, based in New Zealand. The company confirmed the issues, which were first reported Thursday on the WikiLeaks supporters forum, and released FlexPaper 2.3.0 to address them<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-28232","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28232"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28232"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28232\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}