On 16.04.2007, at 18:02, Jeffrey Kretz wrote:

How would this work exactly?  I thought that session cookies and file
cookies are only passed by the browser in a request to a matching domain?

Or would it be something like this:

        1. Log into Washington Mutual Bank Account (20 minute session).
        2. Don't log out
        3. In same browser, visit www.hackmypc.com
        4. This new website initiates in Ajax call to WAMU, and because the
original session is still active, it works?

I explained it in detail here: http://groups.google.com/group/jquery- en/browse_thread/thread/ b467908cd0bb5581/9b83cd2d22c1c140#msg_fb6eec66af5f199b

You basically got it right, except step 4. The real step 4 is:

4. This new website has a <script>-tag pointing to the bank account site because browser security allows loading scripts from other domains even if other cross-domain accesses are forbidden. The attack would not work with AJAX, at least there's no way I know of.

Information about previous attacks on Gmail based on this and similar techniques can e.g. be found here: http://jeremiahgrossman.blogspot.com/2006/01/advanced-web-attack- techniques-using.html http://cyber-knowledge.net/blog/2007/01/01/gmail-vulnerable-to- contact-list-hijacking/

(the second posting is about an even more ridiculous vulnerability than unsecured JSON, though, because Google used a real JavaScript call there, so the malicious website does not even need to override system object constructors to access the data. The underlying attack technique is the same, though). Matt Kruse is in so far right as, as far as I know, there has never been malicious exploits, but exploit is exploit, even if only for demonstration, and everything which is exploitable will be exploited maliciously sooner or later.

--
Markus Peter - [EMAIL PROTECTED]                      http://www.spin-ag.de/
SPiN AG, Bischof-von-Henle-Str. 2b, 93051 Regensburg, HRB 6295 Regensburg
Aufsichtsratsvors.: Dr. Christian Kirnberger
Vorstände: Fabian Rott, Paul Schmid


Reply via email to