Google App Engine open to session jacking

Powered by SC Magazine
 

Cookie snatching tool opens engine.

Google App Engine contains a flaw that allows attackers to hijack sessions and view and change user data.

The flaw was discovered by Matthew Sullivan, a graduate student at Iowa State University.

Using a new tool he developed, Sullivan demonstrated to a crowd at DerbyCon how under undisclosed “specific conditions” a users' Google App Engine session could be hijacked.

He used his Cookie Cadger tool to steal cookies used during a friend's Google App Engine session, run over the conference's open wireless network.

The risks of traffic interception when using open wireless networks and unencrypted HTTP connections was well known, but the attack on Google's App Engine was unique because it circumvented Google's attempt to force customers to encrypted HTTPS.

Sullivan said it was perhaps the first time such an attack had been made against the platform.

“If someone is in admin, you can view the sourcecode, view and edit the datastore. If you use two factor [authentication], it is not going to save you,” he told the audience.

 

He informed Google of the hole about six months ago, and later demonstrated the flaw – without revealing explicit details – due to apparent inaction by Google.

Google has been contacted for comment.

Not FireSheep

Along with Google, Cookie Cadger also hijacked sessions in Facebook, Reddit, Twitter, Wordpress, Drupal and phpBB3.

The Java-based, open source software intercepted specific insecure HTTP GET requests from wireless and wired connections and replayed them into the Firefox web browser.

This meant that attackers could have full access to user accounts on almost any web site, provided that the connections were made over unencrypted connections. 

Cookie Cadger

It targeted sites by way of customisable plugins which would direct the program to search for criteria like user and session identification numbers that indicate a user was logged in.

In attacking Facebook, Cookie Cadger sought out user identity numbers which delivered the target’s name and profile picture in the list of targets open for attack.

This improved on the tactics used by the now defunct FireSheep utility which crawled Facebook pages and could therefore be made redundant during any of Facebook’s many cosmetic upgrades.

“It is a penetration testing tool, not a toy,” Sullivan said. “Imagine it like FireSheep, but way more awesome and actually maintained.”

It provided attackers with a target’s MAC address, operating system, and running applications such as Skype.

But it wasn’t just designed for blackhat activity. Sullivan said it was great at detecting “leaky apps” in secure sites which, like the Google App Engine flaw, were inadvertently operating over HTTP.

He used it to fix leaks on the Cookie Cadger website after flaws were flagged by the Google Chrome web browser.

Users would need to place their wireless cards into monitoring mode to use the tool, a deliberate move by Sullivan to deter “script kiddies”.

The program was developed as part of Sullivan’s university research. He said the campus dorms operated open wireless networks without an option of encryption which made for a good test bed for developing the program.

The source code will be released free later this month after some hefty code clean-up.

It can be purchased earlier with a $10 donation to Hackers for Charity. About $1500 has been raised at the time of publication.

Copyright © SC Magazine, Australia


Google App Engine open to session jacking
 
 
 
Top Stories
IBM, NEC picked for major NSW Transport deals
Final contract negotiations begin.
 
Govt proposes crackdown on ISPs over piracy
Wants new legal powers for copyright industry.
 
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1002

Vote