BugTraq
Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 14 2007 10:23PM
Michal Zalewski (lcamtuf dione ids pl) (2 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 15 2007 02:31PM
pdp (architect) (pdp gnucitizen googlemail com) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 15 2007 02:58PM
Michal Zalewski (lcamtuf dione ids pl) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 15 2007 03:17PM
pdp (architect) (pdp gnucitizen googlemail com) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 15 2007 03:25PM
pdp (architect) (pdp gnucitizen googlemail com) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 16 2007 07:31AM
Base64 (base640 gmail com) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 22 2007 01:08AM
Michal Zalewski (lcamtuf dione ids pl)
There seems to be some confusion regarding the exact impact of the
location.hostname vulnerability, and the ways to protect against it. I
wanted to offer a quick clarification.

1) Cookie setting (session fixation) attacks can be executed universally
and with no restrictions. This is demonstrated by the originally
provided PoC, and is a serious security threat. A common implication
of such a flaw is that the user can be forced to authenticate within
attacker's session, implanted as a persistent cookie.

WARNING: The attack does not require the browser to interact with
the attacked site in any way. The cookie is set somewhere else and
ahead of the visit. In other words, the fact your site runs IIS does
not make you any more secure. The fact your servers are behind Squid
in a reverse proxy mode has no significance.

Vulnerable *clients* can be protected by a proxy that rejects
requests containing a NUL character; Squid is a good example. A
safer option is to implement the prefs.js workaround recommended on
the test page and in Bugzilla, however... and an updated version of
Firefox should be available tomorrow, anyway.

2) Frame / window manipulation and cookie stealing attacks can be
executed against sites that explicitly set 'document.domain' to an
arbitrary value, even if this occurs only on a single sub-page. Some
high-profile sites do that, others don't. Still, the attack is very
much possible; I prepared a new testcase for non-believers:

http://lcamtuf.dione.cc/ffhostname_cnn.html

3) In my initial advisory, I mistakenly stated that XMLHttpRequest() can
be one of attack vectors. It can't - contrary to some sources, in
Firefox, this mechanism ignores document.domain altogether. You have
to rely on the two methods described above - but that's quite a lot,
anyway.

Cheers,
/mz

[ reply ]
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 14 2007 11:27PM
Ben Bucksch (news bucksch org) (1 replies)
Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability Feb 14 2007 11:33PM
Peter Besenbruch (prb lava net) (1 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus