{"id":3196,"date":"2014-04-09T19:33:51","date_gmt":"2014-04-09T23:33:51","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/2014\/04\/09\/protect-data-fix-openssl-heartbleed-bug\/"},"modified":"2021-08-16T23:03:57","modified_gmt":"2021-08-17T03:03:57","slug":"protect-data-fix-openssl-heartbleed-bug","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/","title":{"rendered":"Protect your data and fix OpenSSL Heartbleed bug"},"content":{"rendered":"<div class=\"in_this_tutorial\">\n<h2>Navigation:<\/h2>\n<p><a class=\"btn btn-primary\" href=\"#openssl-disclosure\" type=\"button\">OpenSSL vulnerability disclosure<\/a> <a class=\"btn btn-primary\" href=\"#check-for-heartbleed-bug\" type=\"button\">Check for Heartbleed bug<\/a> <a class=\"btn btn-primary\" href=\"#security-risks\" type=\"button\">Security risks<\/a><\/p>\n<\/div>\n<div style=\"width: 49%; float: left; margin: 10px 0px 0px 0px;\">\n<p>On April 7th, 2014, a very alarming security flaw was exposed in multiple versions of <span style=\"color: red;\">OpenSSL 1.0.1 \u2013 1.0.1f<\/span>.<\/p>\n<p>OpenSSL is the open source software responsible for implementing SSL and TLS encryption and decryption for a large number of websites on the Internet.<\/p>\n<p>This vulnerability has been deemed the <span style=\"color: red;\">Heartbleed bug<\/span> named after the client\/server heartbeat feature introduced in OpenSSL 1.0.1 that is exploitable.<\/p>\n<p>The Apache and NGINX web servers that use OpenSSL by default, account for some 66% of all website traffic on the Internet. There have already been confirmations of over 500,000 widely trusted websites being affected.<\/p>\n<p>The Heartbleed bug can expose 64kb chunks of sensitive data to an attacker from a server\u2019s memory. This can include passwords, credit card info, emails and more, and is why this is a very large <a href=\"#security-risks\">security risk<\/a>.<\/p>\n<\/div>\n<div style=\"float: right;\"><img decoding=\"async\" src=\"\/support\/images\/stories\/website\/security\/openssl-heartbleed\/heartbleed-logo.png\" alt=\"openssl heartbleed logo\"><\/div>\n<div style=\"clear: both;\"><\/div>\n<div class=\"alert alert-success\">\n<p><strong>InMotion Hosting<\/strong> customers, we\u2019ve already patched all vunerable versions of <strong>OpenSSL<\/strong> on our network.<\/p>\n<p>We released a news update about the <a href=\"\/support\/security\/heartbleed-0-day-openssl-security-bug\/\" target=\"_blank\" rel=\"noopener\">Heartbleed 0-day exploit<\/a> when we first found out about this issue.<\/p>\n<\/div>\n<p><a name=\"openssl-disclosure\"><\/a><\/p>\n<h2>Offical OpenSSL vulnerability disclosure<\/h2>\n<p>The official <span style=\"color: red;\">CVE<\/span> or <span style=\"color: red;\">Common Vulnerabilities and Exposures<\/span> notice, is <a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160\" target=\"_blank\" rel=\"noopener\">CVE-2014-0160<\/a> for this OpenSSL exploit.<\/p>\n<p>This is a <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/119.html\" target=\"_blank\" rel=\"noopener\">memory buffer<\/a> exploit, and it was reported on the <a href=\"https:\/\/www.openssl.org\/news\/vulnerabilities.html#2014-0160\" target=\"_blank\" rel=\"noopener\">OpenSSL website<\/a> affecting versions <span style=\"color: red;\">1.0.1 \u2013 1.0.1f<\/span>.<\/p>\n<p><button class=\"btn btn-success collapsed\" style=\"width: 100%; box-shadow: 4px 4px 6px #000;\" data-target=\"#viewdetails\" data-toggle=\"collapse\">Click Here To Expand OpenSSL disclosure<\/button><\/p>\n<div class=\"collapse-group\">\n<div id=\"viewdetails\" class=\"collapse\" style=\"height: 0px;\">\n<div>\n<p style=\"text-align: center; margin-top: 15px;\"><strong>OpenSSL CVE-2014-0160<\/strong><\/p>\n<p style=\"background-color: #f0f0f0; padding: 10px;\"><em><span style=\"color: blue;\">CVE-2014-0160: 7th April 2014<\/span><br>\nA missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64kB of memory to a connected client or server. This issue did not affect versions of OpenSSL prior to 1.0.1.<\/em><\/p>\n<p><em> Fixed in OpenSSL 1.0.1g (Affected 1.0.1f, 1.0.1e, 1.0.1d, 1.0.1c, 1.0.1b, 1.0.1a, 1.0.1)<\/em><\/p>\n<h3>Vulnerable versions of OpenSSL with TLS\/TTLS heartbeat support<\/h3>\n<table class=\"article_table\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>openssl 1.0.1<\/td>\n<td>openssl 1.0.1:beta1<\/td>\n<td>openssl 1.0.1:beta2<\/td>\n<td>openssl 1.0.1:beta3<\/td>\n<td>openssl 1.0.1:a<\/td>\n<\/tr>\n<tr>\n<td>openssl 1.0.1:b<\/td>\n<td>openssl 1.0.1:c<\/td>\n<td>openssl 1.0.1:d<\/td>\n<td>openssl 1.0.1:e<\/td>\n<td>openssl 1.0.1:f<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<p><a name=\"check-for-heartbleed-bug\"><\/a><\/p>\n<h2>Checking for OpenSSL Heartbleed bug<\/h2>\n<p>It\u2019s important to point out that OpenSSL itself is not vulnerable. Only the <span style=\"color: red;\">Heartbeat<\/span> feature, developed back in <span style=\"color: red;\">December of 2011<\/span>, and then released in the OpenSSL 1.0.1 release branch on <span style=\"color: red;\">March 14th 2012<\/span> introduced the bug.<\/p>\n<p><button class=\"btn btn-success collapsed\" style=\"width: 100%; box-shadow: 4px 4px 6px #000;\" data-target=\"#viewdetails2\" data-toggle=\"collapse\">Click Here To Expand Checking For The Heartbleed bug<\/button><\/p>\n<div class=\"collapse-group\">\n<div id=\"viewdetails2\" class=\"collapse\" style=\"height: 0px;\">\n<div>\n<p style=\"text-align: center; margin-top: 15px;\"><strong>Checking for the OpenSSL Heartbleed bug<\/strong><\/p>\n<p style=\"width: 76%; float: left;\">You can very easily check the version of OpenSSL you\u2019re running on your server with a simple <span style=\"color: red;\">phpinfo()<\/span> check. Simply create a PHP script called <span style=\"color: red;\">info.php<\/span> with this code in it:<\/p>\n<pre class=\"cli\" style=\"width: 125px; float: right; margin: -10px 20px 0px 0px;\">&lt;?php phpinfo(); ?&gt;<\/pre>\n<p style=\"clear: both;\">Access that script at <span style=\"color: red;\">https:\/\/example.com\/info.php<\/span>, then in your browser hit <strong>Ctrl-F<\/strong> and search for <strong>openssl<\/strong>:<\/p>\n<p><img decoding=\"async\" style=\"display: block; margin: auto; margin-bottom: 10px;\" src=\"\/support\/images\/stories\/website\/security\/openssl-heartbleed\/checking-openssl-version-in-phpinfo.png\" alt=\"check openssl version for heartbleed bug\"><\/p>\n<p>In the screen shot above, you can see this server is running <span style=\"color: red;\">OpenSSL 1.0.0<\/span> which means it has not been updated to include heartbeat support, which means it is not vunerable to the heartbleed bug.<\/p>\n<p class=\"alert alert-danger\"><strong>REMOVE<\/strong> the <strong>info.php<\/strong> script after looking at it for security purposes.<\/p>\n<h3>If vunerable version of OpenSSL found, check for patches<\/h3>\n<p>You need to have <a href=\"\/support\/server\/ssh\/standard-vs-root-access\/\" target=\"_blank\" rel=\"noopener\">root access<\/a> on your server to check the OpenSSL changelog for applied patches.<\/p>\n<p>A common command to check your OpenSSL changelog is:<\/p>\n<p class=\"cli\">rpm -q openssl &amp;&amp; rpm -q \u2013changelog openssl | head -10<\/p>\n<p>If your vunerable version of OpenSSL has been successfully patched, then you should see something like this:<\/p>\n<pre class=\"cli\" style=\"margin-bottom: 10px;\">openssl-1.0.1e-16.el6_5.7.x86_64 * <span style=\"color: red;\">Mon Apr 07 2014<\/span> Tom\u00c3\u00a1\u00c5\u00a1 Mr\u00c3\u00a1z &lt;tmraz@redhat.com&gt; 1.0.1e-16.7 <span style=\"color: red;\">- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension<\/span>  * Tue Jan 07 2014 Tom\u00c3\u00a1\u00c5\u00a1 Mr\u00c3\u00a1z &lt;tmraz@redhat.com&gt; 1.0.1e-16.4 - fix CVE-2013-4353 - Invalid TLS handshake crash<\/pre>\n<p>If you do not see the recent <span style=\"color: red;\">CVE-2014-0160<\/span> patch applied to your version of OpenSSL, and you\u2019re running one of the vunerable <span style=\"color: red;\">1.0.1<\/span> versions, you should have your host upgrade right away.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a name=\"security-risks\"><\/a><\/p>\n<h2>Security risks of OpenSSL heartbeat exploit<\/h2>\n<p>Unfortunately there is a large security risk due to this exploit because a lot of trust is given to <span style=\"color: red;\">SSL<\/span> or <span style=\"color: red;\">Secure Socket Layer<\/span> connections on the Internet these days.<\/p>\n<p>This is because even if an attacker is sitting between a client and server looking at Internet traffic, when using a <span style=\"color: red;\">SSL<\/span> connection, all information transmitted is expected to be encrypted and unviewable to anyone.<\/p>\n<p><button class=\"btn btn-success collapsed\" style=\"width: 100%; box-shadow: 4px 4px 6px #000;\" data-target=\"#viewdetails3\" data-toggle=\"collapse\">Click Here To Expand Further Security Advice<\/button><\/p>\n<div class=\"collapse-group\">\n<div id=\"viewdetails3\" class=\"collapse\" style=\"height: 0px;\">\n<div>\n<p style=\"text-align: center; margin-top: 15px;\"><strong>Best security practices moving forward<\/strong><\/p>\n<p>There has been a list of sites that were affected by the Heartbleed bug put together by Mashable in their <a href=\"https:\/\/mashable.com\/2014\/04\/09\/heartbleed-bug-websites-affected\/\" target=\"_blank\" rel=\"noopener\">Heartbleed hitlist<\/a>. Some big players like FaceBook, Instagram, Pinterest, Tumblr, Google, Yahoo, DropBox, OKCupid, SoundCloud, and more could have been affected.<\/p>\n<p class=\"alert alert-danger\">It\u2019s highly recomended due to the possibly security implications of this exploit that all Internet users update all of their online account passwords. You should consider using a <a href=\"\/support\/security\/password-strength\/\" target=\"_blank\" rel=\"noopener\">strong password<\/a> for all of your accounts, and possibly storing them in a secure password safe.<\/p>\n<p>Some common critical private information that relies on hiding behind secure encryption is but not limited to:<\/p>\n<ul>\n<li>Authentication ( usernames \/ passwords )<\/li>\n<li>Credit Card \/ Financial data<\/li>\n<li>Private conversations<\/li>\n<li>SSL private keys<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Navigation: OpenSSL vulnerability disclosure Check for Heartbleed bug Security risks On April 7th, 2014, a very alarming security flaw was exposed in multiple versions of OpenSSL 1.0.1 \u2013 1.0.1f. OpenSSL is the open source software responsible for implementing SSL and TLS encryption and decryption for a large number of websites on the Internet. This vulnerability<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4312],"tags":[],"class_list":["post-3196","post","type-post","status-publish","format-standard","hentry","category-ssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you&#039;re vulnerable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you&#039;re vulnerable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-09T23:33:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-17T03:03:57+00:00\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"Protect your data and fix OpenSSL Heartbleed bug\",\"datePublished\":\"2014-04-09T23:33:51+00:00\",\"dateModified\":\"2021-08-17T03:03:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\"},\"wordCount\":759,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"articleSection\":[\"Secure Socket Layer (SSL)\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\",\"name\":\"Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"datePublished\":\"2014-04-09T23:33:51+00:00\",\"dateModified\":\"2021-08-17T03:03:57+00:00\",\"description\":\"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you're vulnerable.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect your data and fix OpenSSL Heartbleed bug\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting","description":"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you're vulnerable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/","og_locale":"en_US","og_type":"article","og_title":"Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting","og_description":"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you're vulnerable.","og_url":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2014-04-09T23:33:51+00:00","article_modified_time":"2021-08-17T03:03:57+00:00","author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"Protect your data and fix OpenSSL Heartbleed bug","datePublished":"2014-04-09T23:33:51+00:00","dateModified":"2021-08-17T03:03:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/"},"wordCount":759,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"articleSection":["Secure Socket Layer (SSL)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/","url":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/","name":"Protect your data and fix OpenSSL Heartbleed bug | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"datePublished":"2014-04-09T23:33:51+00:00","dateModified":"2021-08-17T03:03:57+00:00","description":"A major security flaw in the 1.0.1 version branch of OpenSSL with TLS\/DTLS heartbeat support has been exposed. Be sure to protect your data and check if you're vulnerable.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-data-fix-openssl-heartbleed-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"Protect your data and fix OpenSSL Heartbleed bug"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":null,"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=3196"}],"version-history":[{"count":2,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3196\/revisions"}],"predecessor-version":[{"id":84297,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/3196\/revisions\/84297"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=3196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=3196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=3196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}