[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Fwd: Mozilla Cookie Exploit
At 10:17 PM 1/21/02 -0600, Steve rambled:
>Somebody please remind me if we already had a topic for this meeting.
>I can't remember, and I'm too laz^H^H^Hbusy to search through my old
>email or the archive. ;-)
>
>Here are some ideas for things I can talk about, in no particular
>order:
> . . . Mozilla . . .
OK... so I'm a little laz^H^H^Hbusy, too...
I recall someone asking about that Mozilla cookie exploit during the
meeting. In case you haven't looked at the BugTraq site or missed the
meeting, take a gander at this:
>Date: Mon, 21 Jan 2002 21:10:37 -0800 (PST)
>To: bugtraq@securityfocus.com
>Subject: Mozilla Cookie Exploit
>
>A while ago I discovered a bug in Mozilla that lets you steal cookies for
>any domain by convincing the browser to load a specially formatted URL; I
>have been too busy to get around to making the details known earlier, so
>here they are. This is similar to holes that have been found, both by
>myself and by others, previous in IE. Details available at
>http://alive.znep.com/~marcs/security/mozillacookie/ and are also included
>below. Update to Netscape 6.2.1 or Mozilla 0.9.7 for a fix. Using open
>source products doesn't magically make you invulnerable to security
>problems like those that plague Microsoft.
>
>
> Mozilla Cookie Exploit
> Marc Slemko <marcs@znep.com>
> Last Modified: $Date: 2002/01/22 05:06:04 $
> $Revision: 1.6 $
>
>Table of Contents
>
> [1]Executive Summary
> [2]What's New
> [3]Background
> [4]Details
> [5]Example Exploit
>
>Executive Summary
>
> Cookies are often used to identify and authenticate users to a
> website. If an attacker can steal a user's cookies, then they can
> impersonate that user. The completeness of the impersonation and the
> actions the attacker can perform as that user depend on how the
> particular site uses the cookies.
>
> This bug in Mozilla allows an attacker to, if he can convince the
> user's browser to load a given URL, steal their cookies for any given
> domain. It does not require that active scripting is enabled in the
> browser, and can be done with something as simple as an image tag,
> allowing for hassle free use in HTML email, web based email services,
> etc.
>
> As expected, this bug is also present in Netscape 6.1. Upgrade to
> Netscape 6.2.1 or Mozilla 0.9.7 or higher, which fix this bug.
>
> The take-away message is that, due to implementation bugs in browser
> and in web applications, cookies can be stolen. It is critical that
> any application that depends on cookies does so with an understanding
> of this fact, and takes appropriate measures to limit the damage that
> can be done using stolen cookies.
>
>What's New
>
> * Current Status Summary: (last updated Mon Jan 21 20:48:17 PST
> 2002) I finally got around to making this vulnerability public.
> * mid-Jan 2002: Netscape put up a [6]note on their site saying that
> there was a security hole that they fixed.
> * Sometime between when I reported this bug to Netscape and when I
> made it public: This bug was fixed with the release of Netscape
> 6.2.1 and Mozilla 0.9.7.
> * November 15, 2001: I reported this bug to Netscape via their
> security bug submission form. I had trouble finding a documented
> method for submitting security bugs to mozilla.org, but eventually
> figured out that security@mozilla.org existed. In any case, both
> submissions found their way to the same contact at Netscape.
>
>Background
>
> Cookies are the mechanism used by most websites to identify and
> authenticate a user. If you can steal someone's cookies, you can trick
> the server into thinking you are them. Exactly what this gains you
> depends on the application and how it is designed. It may gain you
> very little, or it may gain you a whole lot (eg. [7]Microsoft Passport
> to Trouble). For more information about cookies, see [8]The Unofficial
> Cookie FAQ.
>
> Cookies are set with a specific hostname or a domain, so that they are
> only sent to that host or domain, with an exception or two that I
> won't go into here. They can also be set with a specific path, or with
> the secure flag, which means they will only be sent if the connection
> is a SSL connection. Normally, this should mean that only the server
> that set the cookie, or others it is operating in cooperation with
> (eg. in the same domain) can read it.
>
> Mozilla has a bug that lets you bypass this protection and steal
> cookies for any domain. This is quite similar to bugs found in
> Microsoft Internet Explorer in the past, such as [9]this one and
> [10]this one. As has been shown time and time again, there are many
> security flaws in many Microsoft products. Sadly, they are far from
> being alone. There is almost certainly no web browser out there that
> is functional enough to browse a significant percent of current
> popular websites and that does not have similar security holes.
>
>Details
>
> The details are very trivial. Loading a URL such as:
> http://alive.znep.com%00www.passport.com/cgi-bin/cookies
>
> ...will cause Mozilla to connect to the hostname specified before the
> "%00", but send the cookies to the server based on the entire
> hostname. The "%00" is the URL encoded version of the null character,
> used in C to terminate strings.
>
> This exploit can be used to steal cookies with a specific path set,
> and can be used to steal cookies with the secure flag set, by using
> the specific path and SSL in the request URL. Note, however, that
> cookies set for a specific hostname (eg. "www.passport.com") can not
> be stolen using this method, but only cookies set for an entire domain
> (eg. ".passport.com").
>
> This bug was first tested on Netscape 6.1 on Windows 2000 and Mozilla
> 0.9.5 build 2001111503 and 0.9.5 build 20011012 on Linux. It is
> expected that all Netscape 6.x and Mozilla versions prior to the
> recently released fixed versions are vulnerable.
>
>Example Exploit
>
> An example exploit [11]is available. Very straightforward.
> _________________________________________________________________
>
> $Id: index.html,v 1.6 2002/01/22 05:06:04 marcs Exp marcs $
> _________________________________________________________________
>
>References
>
> 1. http://alive.znep.com/~marcs/security/mozillacookie/#executivesummary
> 2. http://alive.znep.com/~marcs/security/mozillacookie/#history
> 3. http://alive.znep.com/~marcs/security/mozillacookie/#background
> 4. http://alive.znep.com/~marcs/security/mozillacookie/#details
> 5. http://alive.znep.com/~marcs/security/mozillacookie/#example
> 6. http://home.netscape.com/security/
> 7. http://alive.znep.com/~marcs/passport/
> 8. http://www.cookiecentral.com/faq/
> 9. http://alive.znep.com/~marcs/security/iecookie1/
> 10. http://alive.znep.com/~marcs/security/iecookie2/
> 11. http://alive.znep.com/~marcs/security/mozillacookie/demo.html
-
To unsubscribe, send email to majordomo@luci.org with
"unsubscribe luci-discuss" in the body.