PagerDuty's Response to Cloudbleed Vulnerability
Blog post from PagerDuty
Cloudflare and Google's Project Zero have disclosed a vulnerability in Cloudflare's code, known as Cloudbleed, which caused an unknown amount of sensitive data, such as passwords and personal information, to be leaked over the Internet. The issue originated from a small error in the code that affected Cloudflare's proxy servers, leading them to release data from September 2016 onwards due to unbalanced HTML tags. While PagerDuty’s main marketing website uses Cloudflare, it is hosted on a separate infrastructure and its product login and mobile apps do not use Cloudflare, thus avoiding impact from the leak. Cloudflare has responded swiftly to the vulnerability, and customers are advised to change their passwords and enable two-factor authentication. PagerDuty assures it has taken steps to secure its website and encourages customers to contact their support team if they have concerns.