Firefox Spoofing Bug Puts Passwords At Risk 157
A reader writes "Aviv Raff, an Israeli researcher known for his work in hunting browser bugs, has revealed a Firefox spoofing vulnerability which could allow identity thieves to dupe users into giving up their password. According to Mr. Raff Firefox fails to sanitize single quotes and spaces in the 'Realm' value of an authentication header. Raff was quoted as saying 'This makes it possible for an attacker to create a specially crafted Realm value which will look as if the authentication dialog came from a trusted site.' This vulnerability was shown to be in the latest Firefox, version 2.0.0.11 and until Mozilla fixes this vulnerability Mr. Raff recommends in his blog 'not to provide username and password to Web sites which show this dialog.'"
An honest Security Bug (Score:5, Informative)
Denial is the best option (Score:3, Funny)
Re: (Score:2)
You might be. (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The Exploit I mentioned, browser spoofing, is more sever, but also applicable to any browser that does not specifically signify a popup as being a popup, and supports any decent rendering engine. With a popup and some good CSS/JS
Re:An honest Security Bug (Score:5, Insightful)
It's like saying there are 10 ways a thief can trick a Toyota user into handing over their car keys, but only 1 way a thief can remotely start your Lexus and drive it wherever they want without you even realizing they've done so. Therefore Toyota's are less secure. Or, conversely, it's like saying paper is more dangerous than dynamite, because more people get paper cuts than blow themselves up.
Re:An honest Security Bug (Score:4, Funny)
Re:An honest Security Bug (Score:5, Funny)
Not to get too technical, but... (Score:5, Funny)
All of them. No wait, let me check...
Yep, all of them!
Re:Not to get too technical, but... (Score:4, Funny)
We were traveling by plane at half the speed of smell and got passed by a kite.
Then one of the two engines failed. And the guy sitting next to me went nuts
and asked how far the other engine would take us. All the way to the scene of the
crash, I told him. But we'll beat the paramedics by 35 minutes.
-- Ron White
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I've tried all the different changes to the settings and it still is ass. I run it on my mac, and with four tabs open it's taking over 100MB:
user 114 0.7 11.2 542940 117764 ?? S 8:54pm 5:59.26
11.2% of my RAM is consumed by firefox, and that's only with four tabs open.
Show me the demo!! (Score:5, Funny)
Re:Show me the demo!! (Score:4, Insightful)
Re:Show me the demo!! (Score:5, Informative)
Re: (Score:3, Insightful)
I'm certainly not following any other links from their site. I'd probably end up on goatse.cx or something.
Crap links (Score:2)
[banner]
[popup]
[banner]
SHOP for assholes!
RATE your asshole!
RECOMMEND your asshole to friends!
Read REVIEWS of assholes!
FIND assholes in your area!
COMPARE PRICES for assholes!
Find DEFINITIONS and SYNONYMS for asshole!
100%-free asshole SCREEN SAVERS!
[banner]
[banner]
Sponsored Links:
Looking for FREE ASSHOLES in your area? Click HERE
Assholes repaired at low prices, 100% safe, g
Re: (Score:1, Informative)
Some much more informative links (Score:3, Informative)
and
http://www.kriptopolis.org/falsificando-dialogos-firefox [kriptopolis.org] (Spanish)
Re: (Score:2)
Fortunately, it's pretty simple to just point a browser at a site that uses basic auth and see what the dialog looks like. Opera shows the site and message on separate lines with a "Label: Text" scheme, which would make t
Phishing (Score:5, Insightful)
Re:Phishing (Score:4, Insightful)
Haven't Firefox zealots been pushing Firefox to the "kind of person that falls for phishing"? I was under the impression that "being secure" was one of their big selling points that they liked to talk about.
Given that, they should fix this immediately.
Re: (Score:1, Troll)
Re: (Score:2)
(Sticking a tie in an electric hand mixer - while wearing the tie - runs a close second)
Re: (Score:2)
Re: (Score:2)
Taking advice from nerds (or anyone else) on topics in which they are not experts is the problem. That's why I have a problem with politics because most of the things being advised by politicians are being advised by people who have little or no expertise in the subject at hand. Seeking foreign policy advice from Senator Obama or Governor Huckabee, for instance, shows a lack of common sense. Seeking advic
Re: (Score:2)
I said that it should be patched in my original post, but my point was that this is just a way to do a phishi
Payment processors? (Score:1)
Re: (Score:2)
Re: (Score:1)
And such attacks could be used in combination with stuff like DNS spoofing -- take over your ISPs DNS server and myhostingprovider.com goes where the h4x0r wants it to go.
Re: (Score:3, Informative)
No mainstream site uses it so they'll probably get confused rather than enter in their password.
Re: (Score:3, Interesting)
And also because HTTP authentication dialogs are quite "spoofable" anyway. You can make a phony dialog, whose style matches the system you're targeting. Of course, you can't make it modal like the real one, but most users can't really tell the difference.
Just like the "lock" on older versions of Internet Explorer. People were taught to look for the "lock" icon on the status bar to assure they are safe. However, if the status bar is disabled (IIRC, it is the bloody DEFAULT), you could fake a status bar wit
Re: (Score:2)
Re: (Score:2)
This reminds me of something I've been meaning to investigate for a while now.
If you use Firefox to store your passwords for various sites using its password manager, you have the option of setting a "Master Password" - a password that is used to encrypt your stored passwords on disk as a security precaution. Each time you start an instance of firefox, if you browse to a site for which you have a stored password, firefox will ask
Re: (Score:2)
Re: (Score:2)
Probably easy, with a float. But you can tell half the time because the guys who write these things can't seem to get through a sentence like "Please enter the master password for the Software Security Device" without misspelling at least three words. And they would make it look like an IE dialog. (I'm either using FF or Safari and I get fake IE dialogs all the time.)
Firefox Password Manager fell victim to an attack in late 2006. [slashdot.org] Its mistake was based on t
Nothing to see here. Please move along. (Score:2)
There, fixed the link (I hit Ctrl-V twice).
Re: (Score:2)
It pisses me off that my bank recently moved its login page to a https page.
My bank!!!
I phoned them and complained, and they said it was no big deal.
Well, its on an https page now.
I'm thinking that their logic is that the browser warns the user (usually once, then they turn it off) that they are sending information via a nonsecure page if the handler is not an https server. Call me paranoid, but I want my login page encrypted.
You mean Paypal didn't switch to basic auth? (Score:2)
Don't laugh, Datek (now Ameritrade) used basic HTTP auth until about 2001 or so. Yikes!
Re: (Score:2)
> I'm definitely not going to follow a link from some random website or e-mail.
The bigger picture is coupled with XSS (http://en.wikipedia.org/wiki/Cross-site_scripting) or a writeable web root*, you could be redirected without even knowing it. Malware could also drop a local web page on your computer and redirect you there to offer up the exploit. How about when you purchase things on Ebay and click "Continue to my PayPal account". For every person like
Re: (Score:2)
Please enter your credentials here: (Score:5, Insightful)
Re: (Score:2, Insightful)
Re: (Score:1)
Not Till.... (Score:2)
Re: (Score:1)
Oh, it will change. When the "users" have no money left and are all afraid to touch computers.
Re: (Score:3, Informative)
So if you first logon to paypal and afterwards to another page on the same realm, you don't need to retype the username/password.
If another site mimics the exact realm, the username/password is sent to that site as well.
Details here: http://httpd.apache.org/docs/1.3/howto/auth.html#basicworks [apache.org]
Re: (Score:3, Informative)
That doesn't sound right to me, but I'm not going to test it because I'd rather to go to bed.
The realm is not a trusted string in any way, shape, or form, and if a browser did automatically hand out your username and password to any site claiming the same "Realm" it should cause quite a stir in the security community. Reasonably, I'd expect browsers to follow the specs you linked to in the Apache docs but only within the same domain.
On the other hand, Basic authentication isn't widely used, so I guess m
Re: (Score:2)
Re: (Score:2)
The realm is only half of the identifying element - the URL requesting authentication is the other half. For basic authentication (RFC 2617 [ietf.org], section 2), the realm value is only for the server sending it; if another server (identified typically by [ http/https, hostname, port ]) sends me a WWW-Authenticate header with the same realm name specified, for the purposes of authentication it is a different realm. In digest authentication (section 3), it is possible to have credentials go across multiple servers,
Re: (Score:3, Insightful)
Yes, browser faults are serious and should be fixed, but a bigger problem is sloppy coding of sites that get people into bad "submit th
Youtube video (Score:5, Informative)
http://youtube.com/watch?v=NaCPw1s3GFw [youtube.com]
Not on Mac (Score:2)
Score one for gratuitous eye candy as security feature.
Re: (Score:2)
Re: (Score:2)
The vulnerability I was thinking of doesn't yet exist...
pssst (Score:1, Funny)
PWND (Score:2)
your password
Re: (Score:3, Funny)
Re:pssst (Score:4, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Trawling for Trolls.... (Score:2)
What's this mean for all those who's answer to vulnerability was to block Flash and use Firefox!!!
Re: (Score:2)
Re: (Score:2)
My thoughts...
"There will always be vulnerabilities, the greatest risk will always remain the user."
I remember when my machine got infected with the "I love you" virus. I sat there arguing with two of our network engineers that it was a virus. They were like "No, it came from the owner's son." I kept saying, "Something's wrong...".
They're like
Re: (Score:2)
Go back to using IE?
Re: (Score:2)
The best RPGs were ALWAYS "pen & paper" (well, pencil actually)
Re: (Score:2)
Who pays attention to realm, anyway? (Score:4, Insightful)
I've always interpreted the realm as an advisory comment for the dialog box, and used the URL of the website to indicate whether or not I want to give up a password.
Sam
Re: (Score:2)
Based on the comparison page [kriptopolis.org] that someone posted it isn't so much a vulnerability as just bad formatting that doesn't make things as clear as it could do. If you look at the bit that says "it is from this domain" then you still get the same old (and correct) informatio
Re: (Score:2)
Um, that's the point, the browser window was pointing at google checkout, but if you look at the realm at the end, it's '@ avivra.com'
So if you followed your advice, you would have just given up your information.
Just wondering (Score:2, Insightful)
More problems come from giving the user an identical page hosted on some evil server, in that case the user expects to see the login form.Then again, a bug is still a bug, and the
Re: (Score:1)
Well, the more savvy users probably. I can think of several members of my family would probably assume the bank or whatever had just changed a few things.
Re: (Score:2)
It's only unencrypted if you're doing Basic authentication. HTTP also defines Digest authentication, in which the password is never sent at all, only a digest to prove to the server that the client knows the password.
Re: (Score:2)
How different browsers handle this (Score:2, Informative)
Wow (Score:1)
Re: (Score:2)
Re: (Score:2)
Sorry, but I'm calling BS (Score:3, Insightful)
Then again, what's the problem?
The standard Firefox HTTP auth dialog says "Please enter the username and password for $REALM at $URL". Note the included URL to prevent phishing.
Now what Mr Raff does is basically set up $REALM as "Google Checkout (https://www.google.com) for more details see my page at" and $URL as the domain name he controls. The whole thing looks like: Please enter the username and password for Google Checkout (https://www.google.com) for more details see my page at http://avivraff.com/ [avivraff.com]".
So no, I haven't looked at the HTTP RFC, but I am not sure that forbiding spaces and quotes in HTTP auth realms is the answer.
What Firefox actually needs is just a better, more fail-safe presentation of the data on this dialog.
Just my 2 AC cents (too lazy to create an account for just that)
Re: (Score:2)
Re: (Score:2)
Agreed. Banning spaces in the realm would violate the RFCs and make descriptive realms (eg. "Google Checkout") less feasible. I simply remember that the authentication dialog format isn't under the control of the site, which means that the URL at the end is the URL (technically a prefix) the username and password will be used by. If I see something like his example that appears to imply otherwise, it means the site's trying to play games and I should ignore the implication and trust my browser: the URL at t
FF1.5 (Score:2)
Here is the real question: How do you really know that your browser is safe at all? You can download the code and read it, but I believe it is not just about co
Re:FF1.5 (Score:4, Insightful)
Well first thing is to make sure you are using the latest version. E.g. not using FF 1.5, which doesn't anymore get security updates at all.
That is pretty much all you need to do if you are a normal user. If you need superiour security, then you run the browser in a sandbox.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
A new version once a year is too often for you?!
Re: (Score:2)
Re: (Score:2)
Still safe for me (Score:1)
Payment processors? (Score:2)
I always use my own bookmarks or type the url of the site i wish to visit
Say you're trying to buy something online. One typical use case is the following:
Your tradeoff fails it (Score:2)
Re: (Score:1, Insightful)
Re: (Score:2, Informative)
Re: (Score:2)
(I'm sorry Slashdot, I couldn't let this one go.)
Re: (Score:2)
Finite state machines wit
Re: (Score:2)
By "injection vulnerability", I mean and understand "a possibility to 'break out' of a certain datum and thus inject (part of) it into the surrounding data structure, where this is not desired". Is that not what is happening here?
``Parsing needs to be done as long as not all content is implicitly structured. One point in using XML for anything is to avoid doing any parsing on your own. But, think about it, would you like an e-mail addres