(credit: Wired UK/Shuttershock)
The Federal Communications Commission’s website already gets a lot of traffic—sometimes more than it can handle.
But thanks to a weakness in the interface that the FCC published for citizens to file comments on proposed rule changes, there’s a lot more interesting—and potentially malicious—content now flowing onto one FCC domain.
The system allows just about any file to be hosted on the FCC’s site—potentially including malware.
The application programming interface for the FCC’s Electronic Comment Filing System that enables public comment on proposed rule changes—such as the dropping of net neutrality regulations currently being pushed by FCC Chairman Ajit Pai—has been the source of some controversy already.
It exposed the e-mail addresses of public commenters on network neutrality—intentionally, according to the FCC, to ensure the process’ openness—and was the target of what the FCC claimed was a distributed denial of service (DDoS) attack.
But as a security researcher has found, the API could be used to push just about any document to the FCC’s website, where it would be instantly published without screening.
That was demonstrated by a PDF published with Microsoft Word that was uploaded to the site, now publicly accessible.
FCC has released a statement regarding Ajit Pai and net neutrality. https://t.co/AMzRe1mdLx @FCC @AjitPaiFCC #NetNeutrality @Lucky225 @Hak5 pic.twitter.com/KsVJED6st8
— JON JOLLEE (@h3apspray) August 31, 2017
Other researchers reproduced the vulnerability on August 30, posting about their findings to Twitter.
Because of the open nature of the API, an application key can be obtained with any e-mail address.
Read 3 remaining paragraphs