Plone dismisses claim that flaw in its CMS was used to hack FBI

The Plone security team believe reports of being hacked through a zero-day Plone exploit are false

The security team behind Plone, a content management system that powers many enterprise websites, has dismissed claims that hackers have access to information about an unpatched critical vulnerability.

The dismissal comes after a hacker who uses the online alias CyberZeist published a list of log-in credentials and hashed passwords that he claimed were obtained by hacking into the website by using a Plone zero-day exploit.

CyberZeist, who claims to act in the name of the Anonymous hacktivist movement, said in a post on Pastebin Monday that he didn't find the Plone vulnerability himself, but he was asked to test it out by the person who did.

The FBI website was supposedly selected as a target because it's publicly known that it runs on Plone. However, the hacker said that other websites, including those of the European Union Agency for Network and Information Security (ENISA) and the U.S. National Intellectual Property Rights Coordination Center (NIPRCC), were also vulnerable.

"I obviously cannot publish the 0day attack vector myself as it is being actively sold over [the] Tor network for bitcoins," the hacker said in his Pastebin post.

However, the Plone maintainers said in a blog post on the project's website that "the Plone security team has been aware of a recent claim, has examined it, and has determined that it is a hoax. There is no zero-day flaw in Plone nor in Plone-based distributions."

Matthew Wilkes, a member of the Plone security team, explained in an email message why the team believes both the vulnerability report and the hack are part of a hoax. According to him, there are many inconsistencies between the technical details released by the hacker and the way the open-source CMS works.

Plone is written mostly in Python and runs on top of Zone, a Python-based web application server. CyberZeist claimed that the FBI web server was running FreeBSD 6.2-RELEASE, a very old version of the FreeBSD operating system that dates back to 2007.

FreeBSD 6.2 only supports Python 2.4 and 2.5 and Plone does not run on such old versions of Python, Wilkes said.

The password hashes and salts that accompany the leaked FBI account names are not consistent with values that Plone would generate, suggesting that they were generated in bulk on another server, according to Wilkes. Furthermore, the leaked FBI email addresses match addresses that have been harvested from various sources over the years and are publicly available.

The hacker also claimed to have gathered the logins from backup files found on the web server that had the .bck file extension. The Plone database backup system does not generate files with that extension and the backups that it does generate are stored outside the webserver directories.

"It would be hard to change this behaviour and there would be no benefit of doing so," Wilkes said.

Furthermore, some screen shots posted by the hacker on Twitter suggest the attack forced the FBI website to expose portions of its source code. While this type of attack is common against PHP applications, it's not possible against Python websites that don't use the cgi-bin model of execution.

Another screen shot posted by the hacker shows information from an email that was supposedly extracted from the FBI server's mail logs.

"This appears to be his own server's logs, as although he has modified the name of the server in the log to be an FBI one, he has neglected to change the timezone reported in the emails from Indian Standard Time to Eastern Standard Time," Wilkes said.

On top of all that, CyberZeist has been suspected of faking hacks and data leaks before.

The goal of faking the compromise of, a high-profile website that's known to use Plone, could be to try and trick other hackers into paying for an exploit that doesn't exist. According to Wilkes the so-called Plone zero-day exploit is up for sale on the Tor network for 8 bitcoins -- around US$9,000.

"There is no reason to believe that his claims are genuine and we would warn all website administrators to be wary of social media users claiming to have bugs for sale," he said.

Before rumors of this vulnerability appeared, Plone had already announced an upcoming security patch scheduled to be released on Jan. 17. That fix has nothing to do with the alleged zero-day exploit and is meant to fix a "minor, low severity" security issue that does not allow for remote code execution or file inclusion, Wilkes said.

The FBI did not respond to a request for comment, but its website is currently online and working properly.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments


James Cook University - Master of Data Science Online Course

Learn more >




Back To Business Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?