iTnews
  • Home
  • News
  • Technology
  • Security

Browser cookie handling could widen web attack space

By Dan Kaplan on Nov 5, 2009 11:03AM

Attacker could gain free reign over principal production domain.

A web security researcher has revealed a major new threat to most websites due to the contradictory way that cookies and the domain name system (DNS) act.

Mike Bailey, a senior web security researcher at Foreground Security, released a paper this week demonstrating something most corporations didn't think could happen: a vulnerability on one of their website subdomains can be used to attack their main production domain, which often contains the data that criminals seek to steal.

Bailey claimed that most webmasters operate under a false assumption that because of the way DNS is hierarchically structured and segmented, an exploit on a subdomain (for instance, mail.google.com) cannot impact the principal domain (google.com). But the way that browsers handle cookies makes this possible because cookies are designed so that subdomains can set and customise them for the main domain.

All an attacker would need to do is locate a vulnerability on a subdomain, such as a cross-site scripting or cross-site request forgery flaw, which is quite possible given that most of those pages lack security, Bailey said.

"If I can find a vulnerability on any subdomain, I can leverage that vulnerability against the entire domain name space," he said. "It allows you to affect the way the browser treats [a user's] logged-in session. If I was Amazon, for example, I could put items in your shopping cart, change your password, change your session...because that's all stored in the cookie."

In a paper he published this week, Bailey offered proof-of-concept examples for Google, Expedia and Chase Manhattan Bank. What makes this attack particularly troubling is that in many cases, the companies set up these subdomains for third parties over which they have no security control.

"It's an arcane, difficult exploit to explain," Mike Murray, CISO at Foreground, told SCMagazineUS.com. "But what it comes down to is that every subdomain has as much power to exploit your users as your main domain does. That's a game-changer in a lot of ways for large organisations."

As a result, the two researchers suggest that corporations apply the same level of security to their subdomains as they do their parent domains.

"It's not just 'check the vulnerabilities on the important stuff,'" Murray said. "It's 'check the vulnerabilities on everything that is public facing'. It lowers the ante for the attacker. In the old days, we'd think that if the main site was secure, everything was fine. Now the attacker can go through the side doors."

For a permanent fix, the major browser providers must fundamentally change the way cookies operate, Bailey said.

He added that he is not aware of any in-the-wild exploits that have taken advantage of the problem, but said organisations shouldn't wait to react.

"I do know the attackers know about this issue because I've talked to some of them," he said.

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
attackbrowsercookiednsdomainhandlingnameprincipalproductionsecurityweb

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Dan Kaplan
Nov 5 2009
11:03AM
0 Comments

Related Articles

  • More ransomware websites disappear in aftermath of Colonial Pipeline hack
  • Cyber security pros reminded of self-care importance
  • Active Directory defaults lead to no-fix PrivEsc vulnerability
  • Large amount of IoT gear menaced by unpatched DNS vulnerability
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.