IE Flaw Exposes Users To Spoof-Based Attacks 169
Sotos wrote to mention a C|Net article discussing a new spoof-based attack on Internet Explorer. From the article: " The problem lies in the way Microsoft has implemented a JavaScript component in its Web browser, security researcher Amit Klein wrote in a research document. Internet Explorer does not validate some data fields provided by a PC when the component, called XmlHttpRequest, is used, he wrote. The vulnerability could be exploited with specially crafted code. An attacker could spoof a legitimate Web site, access data from the Web browser's cache or stage a so-called man-in-the-middle attack, which taps into traffic between a user and another Web site, according to Klein's write-up. " Secunia has an alert up on the spoof.
XMLHttpRequest? What's That? (Score:5, Funny)
Re:XMLHttpRequest? What's That? (Score:5, Informative)
Re:XMLHttpRequest? What's That? (Score:2, Informative)
Re:XMLHttpRequest? What's That? (Score:1)
AJAX = abrasive cleaner. Good name for this technology, alright!
EricMaking Google richer [makeeasymo...google.com] (summary of U. Vazirani's talk at UW)
Re:XMLHttpRequest? What's That? (Score:1)
Re:XMLHttpRequest? What's That? (Score:1)
Re:XMLHttpRequest? What's That? (Score:5, Funny)
Other Ingredients: Water, Magnesium and/or Sodium Dodecylbenzenesulfaonate, ammoniym laureth sulfate, Sodium xylenessulfonate, SD alcohol 3-A, Laurel polyglucose, Laurylamidoproptlamine oxide, Magnesium sulfate, Sodium bisulfate, fragrance, Prntasodium pentetate, DNDN Hydantoine, D&C Orange No 4.
See, see, Triclosan [wikipedia.org] is what powers AJAX [epinions.com]!
Heh, no sense of blatant humour... (Score:2)
Tin Foil Hat Time!! (Score:3, Interesting)
2) AJAX is that thing that's making it possible to write responsive, platform-independant, server-based apps.
3) Responsive, platform-independant, server-based apps are those things that are threatening Microsoft's deathgrip on the desktop.
4) [Apply tinfoil hat if needed] So... perhaps Microsoft inserts a dangerous bug in their XMLHTTPRequest implementation, so that
5) Microsoft must deploy a security fix that CRIPPLES or limits AJAX...? And
6) Profit!!
H
Re:Tin Foil Hat Time!! (Score:2)
Although they would love to see cross-platform disappear, and they're attempting that with Avalon and the "Web 2.0" technologies.
Re:Tin Foil Hat Time!! (Score:2)
I mean, ASP.Net/VB.Net/C#.Net already isn't cross-platform (unless you count Mono, which I don't). Does Avalon prevent you from running WAMP (Windows/Apache/MySql/PHP) instead of IIS/ASP.Net?
Anyhow, its obvious the reason this buy was found was because XMLHttpRequest is getting more usage due to AJAX being the latest web-devel buzzword. This hole would have stayed in t
Re:Tin Foil Hat Time!! (Score:2)
Re:Tin Foil Hat Time!! (Score:2)
Right, and you might say their "mistake" in making the component is that its functionality is too generic, too easy duplicated in other browsers and platforms. So updates to their XMLHttpRequest should add features that are as much as possible Windows-only and/or IE-only (perhaps "helpful" direct ties to Internet Explorer GUI elements).
As long as they can keep Mozilla, etc., playing catch-up (and copying the MS
Re:XMLHttpRequest? What's That? (Score:3, Informative)
Crank Up The Flamethrowers (Score:5, Insightful)
Every security announcement is met with the same level of bickering without any resolution in sight. Goggle "Internet Explorer Firefox security comparison" [google.com] and you get another 1.7 million opinions.
Will it ever end?
Re:Crank Up The Flamethrowers (Score:2, Insightful)
Will it ever end?
If it does, so too will Slashdot.
Re:Crank Up The Flamethrowers (Score:5, Funny)
Well... (Score:1)
On a more serious note, just because posts like this usually devolve into a browser flamewar, I can say that personally as a web developer, news posts about browser exploits are some of the most important to
Re:Crank Up The Flamethrowers (Score:1)
But you're right. I'm sure everything below will turn out just like you predicted.
ActiveX (Score:4, Insightful)
Re:ActiveX (Score:3, Informative)
I would say that the ActiveX and CSS are my two main headaches with IE. The other would be the lack of tabbed browsing but I don't use IE.
At the heart of it all (Score:2, Insightful)
I think that the only reason post like this one garner so much discussion is because the web browser has become (arguably) the most important program on the PC. Not only is it used for certain parts of the operating system, but I'm willing to bet my reputation that almost everyone in those 1000+ comments are using one of the browsers being discussed to discuss.
Until the web browser evolves or is replaced, this kind of conversation is unavoidable.
Re:Crank Up The Flamethrowers (Score:2)
That has to be worth something.^_^
Honestly though, I agree with your prediction, but I'm still a fan of reading reports like this (as long as they're good ones) because they at least have the capability to inform people (i.e. don't use practice $foo, or this is what caused that problem last week, etc.), and not just incite riots on the message board.
They're just reporting it, we're
Re:Crank Up The Flamethrowers (Score:1)
The Goggle, it does nothing.
Re:Crank Up The Flamethrowers (Score:2)
Okay, now we spend time generating another 500+ comments discussing how shitty IE's security is and how Firefox isn't much better. Add the other browser users (Opera, Konqueror) and we get another 300+ comments. Throw in the fact that each cross-platform browser runs better in Linux/OSX/BSD, or is emulated better (hence, more secure) through Wine and we generate another 250+ comments.
And if you're lucky, you get a few "this isn't really a security hole" posts.
This isn't really a (significant) security h
Re:Crank Up The Flamethrowers (Score:1)
Re:Crank Up The Flamethrowers (Score:2, Funny)
Nazi.
Re:Crank Up The Flamethrowers (Score:2)
Yes, and that would be plain wrong IMHO, and it would just tell me that these people either don't keep in touch with computer security well or are plain blind zealots not seeing that few modern browsers, if any, have been "secure" in the meaning of the word "not getting serious exploits".
What I think
Not really... (Score:2)
Why (Score:2)
Re:Then why do you even bother posting? (Score:2)
What about (Score:4, Interesting)
Re:What about (Score:2)
Re:What about (Score:2)
A lot of sites base their security, in part, on the idea that you can only access certain pages if you were referred to them by the same site
Security? Better to use a session variable accessed via a session ID passed around using cookies or URL rewriting [ericgiguere.com] than depend on the easily spoofed (and often disabled) "referer" header...
Eric
Are you sending a referer header? [ericgiguere.com]
You gotta love this part (Score:4, Insightful)
Security through obscurity, yeah right. IMHO this just makes Microsoft get on the ball and do something about the problem rather than putting it on the back burner since "nobody would know about it."
Re:You gotta love this part (Score:5, Insightful)
Re:You gotta love this part (Score:2)
There are more than 2 options! (Score:2)
"That kind of company", eh? I see.
What's wrong with notifying Microsoft about the flaw immediately, explaining that you will be making a full public release in 3 weeks? That gives them time to make a patch, release it, and hopefully a l
Re:You gotta love this part (Score:2)
Please provide evidence for your claim, coward, or else why should be believe you?
Re:You gotta love this part (Score:5, Informative)
Re:You gotta love this part (Score:2)
Re:You gotta love this part (Score:2)
And *your* Social Security number is... (Score:2)
And your Social Security number is:
103-56-2245
Your mother's maiden name is:
Greene
Your Visa Card number is:
4364-3343-1203-3096 (exp. 10, 2006)
Sometimes security through obscurity isn't necessarily a bad thing -- it isn't always the case that just because an exploit exists, that it necessarily should be publicized.
Dupe? (Score:5, Funny)
Job security (Score:3, Funny)
All the secuity articles guarantee readers and advertisers
Re:Job security (Score:1)
Spoof-based? (Score:5, Funny)
Re:Spoof-based? (Score:1)
Re:Spoof-based? (Score:2)
B> You could only give me one.
[/anal]
But thanks! :)
A quick response to another IE flaw (Score:1, Interesting)
Ok, sarcasm off.
I can't believe the firefox revolution is slowing...
AJAX (Score:1)
Re:AJAX (Score:2)
Here come the pre-packaged sound bites. . . (Score:5, Funny)
"I bet there will be a fix out within 24 hours! Exploits don't count if they are fixed quickly, right?"
"I don't care if they find a thousand exploits; I still won't use IE!"
Oh, wait . . . I thought the article was about another Firefox exploit. Nevermind.
Re:Here come the pre-packaged sound bites. . . (Score:2)
Misquote (Score:1)
When will people get the message?
Re:Misquote (Score:2, Funny)
In this case, hopefully before their identity is stolen.
But then we can't access the net (Score:3, Funny)
The (first) 'A' in AJAX (Score:1, Informative)
Let the IE/FF comparisons begin (Score:5, Informative)
Internet Explorer [secunia.com]: Microsoft Internet Explorer 6.x with all vendor patches installed and all vendor workarounds applied, is currently affected by one or more Secunia advisories rated Highly critical...Currently, 20 out of 86 Secunia advisories, is marked as "Unpatched" in the Secunia database.
FireFox [secunia.com]: Mozilla Firefox 1.x with all vendor patches installed and all vendor workarounds applied, is currently affected by one or more Secunia advisories rated Less critical...Currently, 3 out of 24 Secunia advisories, is marked as "Unpatched" in the Secunia database.
Re:Let the IE/FF comparisons begin (Score:4, Funny)
Re:Let the IE/FF comparisons begin (Score:2)
Ahhh! (Score:2)
Re:Ahhh! (Score:1)
Re:Ahhh! (Score:2)
Re:Ahhh! (Score:2)
Re:Ahhh! (Score:2)
I was hoping someone would notice. Thanks.
No big deal... (Score:5, Funny)
(I really do wish it was completely a joke)
Amateurs... (Score:5, Funny)
There's no chance a spoof attack would ever wo.df&^3478adf@$%%
/*User dead*/
So what exactly.. (Score:1)
I have to admit that I don't have much experience with IE, but is it really required to use ActiveX to use XMLHTTPRequest in IE? Somehow I got an impression that JavaScript is all that is required... (or ActiveX is used under the hood?)
Re:So what exactly.. (Score:4, Informative)
You only have to write Javascript to use it, but that doesn't change the fact that the XMLHttpRequest object is provided by ActiveX, and if you switch off ActiveX, XMLHttpRequest stops working.
This will change in Internet Explorer 7, which implements XMLHttpRequest as a native host object in the same way as other browsers. There's some discussion of this on the IE Blog. [msdn.com]
Re:So what exactly.. (Score:2)
Re:So what exactly.. (Score:2)
There Goes Someone's Weekend (Score:3, Funny)
Cross-Browsing (Score:3, Interesting)
Re:Cross-Browsing (Score:4, Informative)
IEView (Score:2)
Opera, I understand, has similiar functionality available.
Re:Cross-Browsing (Score:2)
IE can even just be another tab in your Firefox window.
Re:Cross-Browsing (Score:2)
Re:Launchy (Score:1)
Re:Cross-Browsing (Score:2, Informative)
Re:Cross-Browsing (Score:2)
http://ieview.mozdev.org/ [mozdev.org]
at least the first part...
How awful is the IE codebase? (Score:5, Interesting)
Now, what really interests me is in how horrible the quality of the Internet Explorer code must be for it to run into so many problems. Considering how unappealing Mozilla was, I can't even begin to imagine how absolutely terrible the IE codebase is.
Perhaps somebody with experience with both could, assuming NDAs don't get in the way, describe how the quality of the two codebases compare.
Re:How awful is the IE codebase? (Score:2)
We were wondering the same thing and recently sent a Mozilla developer to work undercover at Microsoft on the IE dev team to check this out.
The doctors assure as as soon as he stops drooling he should be able to write up a report.
Firefox has to be brought up now (Score:1, Interesting)
Re:Firefox has to be brought up now (Score:1)
"This public disclosure potentially puts computer users at risk," the Microsoft representative said." - I would say it WARNS users (even though most wont listen) Its kind
Re:Firefox has to be brought up now (Score:2)
To be fair, Internet Explorer is also "auto-updated" through automat
IE 7.0 has a lot of good features (Score:1)
Incorrect title (Score:4, Informative)
Read the paper [cgisecurity.com]
Yawn...
Er... duh? (Score:1)
JavaScript... in Internet Explorer? (Score:2)
Don't you mean "Jscript" ?
WHAT?!?!? (Score:3, Funny)
I don't believe it!!!!
timing of the disclosure (Score:2)
Whenever I see fairly coincidental timing regarding related subjects, it makes me wonder if they're really coincidental.
Turbocharge the Law? (Score:2)
Spoofing, to me, seems intrisically a social engineering attack, not so much a flaw in the application.
Designing applications (be it Internet Explorer, Mozilla/Firefox, Safari, Opera, etc.) can only provide ways to make identifying spoofs easier, reducing the risks. But I contend applications can never nail every thing down so tightly, considering the wide range of sites users could visit. If your design requirement is "The most foolish user must never be fooled by the most clever phisher anywhere, ever, i
Big deal, you can already spoof any site. (Score:2, Informative)
The security bulletin talks about how using a specifically formed URL, you can download content from a remote site. I do the same thing all the time with a simple bridge in php:
httpbridge.php:
---------------
so if you want to get content from google in javascript:
var A=null;try{A=new ActiveXObject('Msxml2.XMLHTTP');}catch(e){try{A=ne w ActiveXObject('Microsoft.XMLHTTP
Re:Big deal, you can already spoof any site. (Score:2)
The code described in the article runs in the browser which thinks that the current page and XmlHttpRequest response are from the same server (standard XmlHttpRequest security number 1), but in fact they are not. That's the cheat. Combined with a proxy server, that means that a page served by www.attacker.com can access data from www.victim.com, which should never be permitted.
Justin.
What;'s funny... (Score:3, Funny)
Re:Oblig (Score:5, Funny)
Re:Oblig (Score:1)
Re:Oblig (Score:2)
Re:Again? (Score:2)