Cross Site Scripting Discovered in Google 158
Security Test writes "Yair Amit posted a message early this morning to The Web Security Mailing List outlining a Cross Site Scripting flaw in Google that allows an attacker to carry out Phishing Attacks."
but this was resolved three weeks ago. (Score:5, Informative)
Re:but this was resolved three weeks ago. (Score:5, Insightful)
Re:but this was resolved three weeks ago. (Score:1)
Yes, I know. I was referring to the use of the word "allows" in the description.
Re:but this was resolved three weeks ago. (Score:4, Informative)
character encoding enforcement."
12/01/2005 for those in the US.
Re:but this was resolved three weeks ago. (Score:5, Funny)
Re:but this was resolved three weeks ago. (Score:1)
Not a requirement, to be sure, but it sure is convenient.
Re:but this was resolved three weeks ago. (Score:5, Informative)
Unless you cross a year in your directory, like logs going from September, 2004, to August, 2005.
amen (Score:2)
absolutely... biggest category -> middle category -> most restrictive category is good, going the other directions makes no sense at all
RFC 3339 (Score:2)
Re:but this was resolved three weeks ago. (Score:2)
Although, I might add, in SQL, I never use date columns, and instead rely on storing a timestamp into an INTEGER column. Unlike SQL date columns, a timestamp always comes out in the same format, and can be passed to a time formatter (strftime() in most programming languages).
Re:but this was resolved three weeks ago. (Score:2)
Re:but this was resolved three weeks ago. (Score:2)
For information stored in hierarchical granularity, sort order is 'biggest to smallest'. There is no other correct answer.
Justin.
Re:but this was resolved three weeks ago. (Score:2)
Not a requirement, to be sure, but it sure is convenient.
That format MM-DD-YYYY gets confused when trying to organize these dates. Dec 1, 2005; Jan 9, 1998; Apr 12, 2005
01-09-1998
03-15-1993
04-12-2005
Whereas YYYY-MM-DD will sort as
1993-03-15
1998-01-09
2005-04-12
Re:but this was resolved three weeks ago. (Score:5, Funny)
Re:but this was resolved three weeks ago. (Score:2)
Re:but this was resolved three weeks ago. (Score:2)
character encoding enforcement."
12/01/2005 for those in the US.
This is why since high school I have used alpha abbrevs for the month when I write dates, like Dec 21, 2005, even when filing in forms that have pre-printed slashes.
OT: date format (Score:2, Interesting)
No offence but i think that this US format is plain stupid... really...
Is that 12 of january or 1 of december? its a format that have several possible intepretations and without any logic (middle time scale/low/high !?!)
I can understand very well the 2005/12/01 and the 01/12/2005 (i prefer the first, specially in computers, but last is better for reading on paper) but the mixed US format is wierd and dangerous...
Most of the time looks like you must guess the correct date.
so why dont the US kill t
Re:OT: date format (Score:3, Funny)
It was scheduled to be phased out on 01/03/02 but, well...you can guess what happened.
Re:OT: date format (Score:4, Informative)
No, it is a de-facto standard in this country. That is the way dates virtually all dates are written, so there is not often confusion. For international compatibility, we use named months or the ISO format. The U.S. military, for example, has standardized on YYYYMMDD (and HHMM, obviously).
Incidentally, it's not entirely without logic. The order of the numbers matches the way we usually talk, i.e., ("December Twenty-First, Two-thousand and five"). Except for the the holiday colloquially known as the "4th of July," the vast majority of people say it in the format, "month day, year." Whether the written or oral ordering of the date this way came first, or simultaneously, I do not know, but it is at least consistent.
Re:OT: date format (Score:2)
Re:OT: date format (Score:2)
In Strunk & White's "Elements of Style", a case is made for the logic and error robustness of "21 December 2005" (text separating numbers, and progressively larger units) ... and they are right. And that's the way I have talked and written ever since I first read Strunk & White, about 25 years ago.
The ISO standard ordering YYYYMMDD is perfectly sensible, too, for computer documents.
Re:but this was resolved three weeks ago. (Score:2)
Could have been announced 3 weeks ago too. (Score:4, Interesting)
Re:Could have been announced 3 weeks ago too. (Score:2)
Have to patch 20 servers over the course of a week instead of patching 400 client PC's over the course of a year.
Re:Could have been announced 3 weeks ago too. (Score:5, Insightful)
This is great when there is only one site to update. But when everybody is running their own copy of the web app on their web server, you get problems like the recent epidemic of PHP-based bulletin board exploits.
Web Services (Score:1)
Re:Could have been announced 3 weeks ago too. (Score:2, Insightful)
Re:Could have been announced 3 weeks ago too. (Score:2)
Bug in a web application? Millions of users are exposed to the bug until a patch is released.
Bug in a locally run application? Millions of users are exposed to the bug until a patch is released.
Where's the difference here?
Re:Could have been announced 3 weeks ago too. (Score:3)
Bug in a web application? Millions of users are exposed to the bug until a patch is released.
Bug in a locally run application? Millions of users are exposed to the bug until a patch is released and they hear about it and they actually apply it.
Re:Could have been announced 3 weeks ago too. (Score:2)
The phrase 'double edged sword' refers to a solution having good effects and bad effects. My comment meant to indicate that a web application did not have an applicable bad edge; it's only a single-edged sword.
Now... the 'bad edge' could be that feature improvements introduce NEW bugs, or undesirable feaetures, immediately across the board, but I'm sure
Re:but this was resolved three weeks ago. (Score:1)
Re:but this was resolved three weeks ago. (Score:2)
Which is very similar to the OpenVMS and Eeeeevil American Military
dd-aaa-yyyy format.
Re:but this was resolved three weeks ago. (Score:1, Troll)
Dammit! They should be more like Us!
It's been fixed (Score:4, Informative)
Although the article details an interesting exploit, Google fixed this on the 1st of this month--The title is somewhat misleading. It is useful to know that Google fixed this vulnerability 2 weeks after it was discovered, on November 15th.
Also, for those of us unaccustomed to DD/MM/YYYY date format, that's the format of all dates in the article.
Re:It's been fixed (Score:1, Funny)
Re:It's been fixed (Score:2, Funny)
Others.. (Score:5, Informative)
It show a strength of webbased applications (Score:2)
Re:Others.. (Score:3, Informative)
I spent quite some time explaining things to the GMail devs but no freebies for me..
Re:Others.. (Score:5, Informative)
Not true. Google ignored a security hole for two years [jibbering.com] and don't understand Javascript well enough to fix it properly. [jibbering.com]
Re:Others.. (Score:2)
Um, did you read the link? It wasn't introduced Oct 17th, that's just when the article was written. I quote:
Sure, they fixed it three days after the article was written, but that doesn't mean it didn't go unfixed for two years.
Javascript is a security problem? (Score:2, Informative)
I turned javascript off in 1999, just one less glaring security issue for me to address. Before anyone starts talking smack about responsive web apps, just remind me what Ed Felton said about flying pigs.
That's right, disable js and fix the web!
Re:Javascript is a security problem? (Score:5, Informative)
Re:Javascript is a security problem? (Score:3, Insightful)
What needs to happen is sites need to use LESS javascript, and shoud degrade gracefully when js is disabled. Unfortunately, with AJAX, it's more common than ever.
Re:Javascript is a security problem? (Score:2, Funny)
Gosh, you make it sound like the Web started as a text content medium or something!
Re:Javascript is a security problem? (Score:1)
Re:Javascript is a security problem? (Score:5, Insightful)
And then what happens to AJAX?
JavaScript is not the issue; the issue is sites/providers not treating data from the "real world" as suspect and doing a rigorous examination of it before allowing it in or executing anything based on it. When I'm writing Perl CGIs that are accessible from outside my system, I always have the taint mode (-T) switch enabled. You have to be suspicious of data coming in and treat it as radioactive until you can verify its integrity.
Re:Javascript is a security problem? (Score:2)
All this radioactive data is why my server is encapsulated in lead and buried in solid rock. Step 2 is to convert the radioactivity into current and make a self-contained UPS.
OH NOS! (Score:2)
I dunno... a bunch of empty-headed hype men will have to find a new buzzword to latch onto?
It's just a thought.
Re:Javascript is a security problem? (Score:2)
It should be noted while Google uses a lot of JavaScript, all the services, that I have used to far, are accessible with it turned off. Take a look at
Re:Javascript is a security problem? (Score:2)
XSS in my banks website (Score:5, Informative)
response was something like: "We will work on it; or we wont - but we wont tell you
Which sucks...
Here we go:
Original:i on=SelectMenu&SMID=EigenesOrderbuch&MenuName=&Init Href=http://www.consti.de/secure [vr-ebanking.de]
/Fälschung --> Imitation /
https://www.vr-ebanking.de/index.php?RZBK=0280 [vr-ebanking.de]
MY Version (XSS):
https://www.vr-ebanking.de/help;jsessionid=XA?Act
... Hope they change their mind, sometime. :)
Consti / thr0n
Re:XSS in my banks website (Score:1)
Blast. My mod points expired a few seconds before I tried to mod this up.
-:sigma.SB
What bullshit... (Score:3, Interesting)
Re:What bullshit... (Score:2)
Re:What bullshit... (Score:1)
bzzzt. (Score:2)
Re:bzzzt. (Score:2)
Re:bzzzt. (Score:3, Interesting)
In an earlier XSS exploit, I wrote a javascript that could be injected into a citibank site. It would automatically go through the ENTIR
Re:bzzzt. (Score:2)
There are many ways it can become dangerous, most of the time these exploits are compounded to cause a serious problem and don't work alone.
It shouldn't all be down to web developers though (you ha
Re:What bullshit... - Are you out of your mind??? (Score:1)
Re:What bullshit... - Are you out of your mind??? (Score:1, Troll)
Do you work for Watchfire by chance?
Re:What bullshit... - Are you out of your mind??? (Score:3, Insightful)
They can even go to multiple problems at the same time. If this problem were more prevelant, a hacker could craft a page that steals ALL your online logins/cookies/etc from any site that had the problem. They would just need to craft a page with multiple framesets that load up all the vunlerable pages.
XSS is also making news because it's being used by phishers to forge stuff from the tar
Re:What bullshit... - Are you out of your mind??? (Score:1)
Re:What bullshit... - Are you out of your mind??? (Score:1)
I don't work at all dude!
Re:What bullshit... (Score:2)
From the disclosure:
Therefore, when sending an XSS attack payload, encoded in UTF-7, the payload will return in the response without being altered.
For the attack to succeed (script execution), the victim's browser should treat the XSS payload as UTF-7.
This is a complicated vulnerability to have exploited in practice, but now that it has been mentioned, it makes me wonder just how many other encoded XSS vulns could be done wit
Re:What bullshit... (Score:1)
Advantage of online applications (Score:5, Interesting)
The downside is that this only works if the app provider is a proprietary vendor with a closed architecture. If 3rd parties are allowed to create extensions or if users can create their own utilities/add-ons then centralized patching would likely introduce the same types of incompatibilities and breakages that current OS patches can introduce. Worse, centralized control might mean that users have no choice but to live with the patched version.
This is amazing. (Score:5, Interesting)
A major web site has a flaw. White hat and black hat "hackers" find that flaw, exploit it, and either abuse it or let the web site know about it. The web programmers go in and close the exploit because it affects how their customers use the service and could open them up to some liability.
This is the way the free market works. I'm a huge fan of how quickly the Internet (anthropomorphically) adapts to the changing needs of the billion of users. Some exploits that aren't fixed by the owners of code are fixed by third parties -- sometimes for profit and sometimes for free. Before we can even write one law to attempt to solve problems, others are already attacking the problems.
I'd like to see it stay this way. Every time we move forward to create legislation to protect the end user (see CAN-SPAM and a myriad of other laws), we see failure time and again. The loopholes in the laws make them irrelevant quickly, and all we get out of that is wasted money and wasted time.
Let the growth and expansion occur freely. We'll see some bad times (new viruses and new spam exploits) but we'll see those fixed in short order. If they don't get fixed, why is the Internet still chugging along and growing every day?
Re:This is amazing. (Score:1)
Market doesn't work, market doesn't eat, market doesn't do crap except market exist only as an abstact entity, a theoretical construct.
Techies, geeks, hackers, whatever label
Some of them are motivated primarily by money and secondarily by showing the company they're good at
resolving upcoming problem...in hope somebody will notice when it's firing time again..but it's just daydreaming. Others, a minority, do t
Re: dada's latest lassez-faire rant (Score:2)
I think the 90% of the world that doesn't like obsessing with security would disagree with you about lassez-faire and how well it is handling identity theft and other criminal conduct that has exploded thanks to the internet. My dad *deserves* legal protections from phishing attacks (a specific example: banks should be required to guarantee client accounts... that is WHAT A BANK IS!!!). And a small business should have their online transactions safe from remote fraud (with banks agai
Re: dada's latest lassez-faire rant (Score:2)
Re: dada's latest lassez-faire rant (Score:2)
Yes, clearly the unregulated (or minimally regulated) Internet has proven vastly inferior to the legally enforced areas like theft, rape, assault, and murder. It turns out that market forces don't eliminate 100% of problems, whereas clearly government regulation doe
Encoded post.. (Score:2, Insightful)
Re:Encoded post.. (Score:1, Informative)
I think that the authors of the report did the responsible thing in informing Google first, waiting until the problem was fixed (within a reasonable amount of time) and then describing the vulnerability without providing an exploit.
The message gives enough clues about how to create an exploit, though. You j
XSSholes! (Score:5, Funny)
I had to laugh at that one.
Only an XSShole would steal your cookies.
Another Beatles Beatles (Score:5, Informative)
Re:Another Beatles Beatles (Score:2)
Point number 2 - As long as they post a decent article, I'd say it's fair game.
Cross-Site Scripting for Internet Explorer (Score:5, Interesting)
This is reported as a Google.com bug, which is partially true. But this is only one half of the problem. The other half of the problem (mentioned in the full article) is due to a dubious feature in Internet Explorer: when it gets a page without a specified character encoding, it does not rely on default values for the encoding (which should be iso-8859-1 for HTML or UTF-8 for XHTML).
Instead, Internet Exploerer tries to guess the encoding of the contents by looking at the first 4096 bytes of the page and checking the non-ASCII characters. In the case of the cross-site scripting attack decribed here, the problem is that IE would silently set the encoding of a page to UTF-7 in case some characters in the first 4096 bytes looked like UTF-7. This silent conversion to UTF-7 by Internet Explorer in a text that Google assumed to use the default encoding allowed the attackers to bypass the way Google was filtering "dangerous" characters in some URLs.
The article puts the full blame for the vulnerability on Google.com. I think that a part of the blame should also be shared by the Internet Explorer designers (and any other browser that does unexpected things while trying to guess what the user "really meant").
Re:Cross-Site Scripting for Internet Explorer (Score:2)
Camino: Default setting is "Automatically Detect Character Encoding"
Firefox: Default setting is UTF-8
Safari: Doesn't explicitly say, but I just fed UTF-8 into a text file, no encoding, and Safari picked it up. So, I assume that it's default is also 'automatically detect'.
Re:Cross-Site Scripting for Internet Explorer (Score:2)
Re:Cross-Site Scripting for Internet Explorer (Score:2)
The viability of the Web is entirely dependent on browsers trying to figure out from incomplete, incorrect and/or inconsistent information what users "really meant." A browser that only renders standards-compliant HTML with unambiguous character encodings would only be able to handle a few percent of the Web.
The fund
Re:Cross-Site Scripting for Internet Explorer (Score:2)
The response by Google..... (Score:3, Insightful)
Re:The response by Google..... (Score:1)
Re:The response by Google..... (Score:2)
How do they find these things . . . legally? (Score:2, Insightful)
While it may be one thing to pull apart IE and Windows XP (they can be done remotely, in an unconnected lab, with zero impact to a larger community), where does one acquire the balls to go
Re:How do they find these things . . . legally? (Score:5, Informative)
I've found dozens of XSS problems on sites, and have made news for one on Citibank. I've only received a few threatening legal letters from companies.
Cookies (Score:3, Interesting)
Did anyone else notice this?
Re:Cookies (Score:5, Informative)
Firefox (and other Mozilla derivatives) support a preloading link. When they encounter such a link in one page, they begin downloading the content for the linked page, so they have it ready. Google assumes that you're reasonably likely to click on the first link they've sent you for some types of search result (probably where there's a very high search ranking for one particular site for the term you searched for), so sends Mozilla/firefox users a preload warning along with the search result page, with the URL of the first search result page. Firefox does its thing and starts downloading the page content for the first search result before you even click on it - including any cookies.
Re:Cookies (Score:2)
Re:Cookies (Score:1)
Google vulnerable? (Score:5, Insightful)
So isn't it really the "auto detect" feature in the browser that causes the vulnerability, and not Google's lack of "charset encoding enforcement" as the mailing list posting from Watchfire Research claims? Let's put the blame where it belongs. I say we should applaud Google for going the extra kilometer to protect users with non-compliant browsers.
Re:Google vulnerable? (Score:1)
As for Google going the extra 0.621371192 miles to make sure the end user is protected against this, I do praise them for their efforts. The part in the article that caught my eye was the segment near the bottom showi
Re:Google vulnerable? (Score:1)
Re:Google vulnerable? (Score:2)
As far as I know, HTTP says that if the HTTP headers have a content-type header, the browser should treat the data as though it was that content type regardless of the actual contents. But IE does not do this. IE will use the content-type header, the file extention AND the contents of the file to decide what to do with it. This means that even though the web server sent the file as text/plain, IE may not render it as pla
Re:Hmm (Score:1, Insightful)
Re:Hmm (Score:2, Insightful)
Re:Hmm (Score:5, Informative)
--[ Discovery Date: 15/11/2005
--[ Initial Vendor Response: 15/11/2005
--[ Issue solved: 01/12/2005
Message posted: 21/12/2005
They did give them a chance to fix it first.
Re:Hmm (Score:3, Insightful)