Security
Cross-site scripting attacks
Two weeks ago, this page examined SQL injection attacks on web applications. Another well-known attack is cross-site scripting, often abbreviated as "XSS." Cross-site scripting is, perhaps, a more subtle way of breaking web applications, but its effects can be just as damaging as SQL Injection.The basic vector for XSS is user input into a website that is not filtered to remove dangerous content. One of the more obvious ways this can occur is with sites that allow users to add comments to stories, without removing or altering HTML tags that they enter. For example, if one adds a comment that contains:
<script>alert("howdy")</script>
and someone else, when looking at that comment, gets the alert,
the site is vulnerable to XSS. Obviously, a javascript popup is not
particularly dangerous and would be a clear sign that something odd is
going on. This kind of 'attack' is only used as a proof of concept.
The key thing to note
is that one user can run javascript in the context of another user's
browser, with all of the information and privileges of the targeted user
(or, at least, the subset granted to javascript).
There are other mechanisms to inject this kind of malicious content, either as HTML links or by causing error messages that display the content. Essentially any place that a web application displays user input can be exploited if the input or output is not filtered correctly. When XSS attacks appear in links, they are often encoded in hex using the '%xx' or '&#xx;' so that it is not immediately apparent that the link contains malicious content.
A wide variety of actions can be triggered by an XSS exploit, including cookie theft, account hijacking, and denial of service. A clever attacker could make a page that looks exactly like the login page of a popular website (Google for example) and an unwary user could be fooled into entering their username and password into this page after following a link. By exploiting an XSS hole recently reported and discussed on the Bugtraq mailing list, the link would not obviously be malicious and could start with http://www.google.com.
Another common attack is to hijack a session by using an XSS exploit to capture a cookie value that stores a session ID. An attacker can then use that session ID to take over a currently logged-in session at the web site and for all intents and purposes, become that user. This attack is especially nasty if that user happens to be an administrative user - or is logged into, say, a financial site.
Avoiding XSS in a web application requires diligence in filtering user input (a common theme in nearly all web application vulnerabilities). Any user input that is sent back to browser for any reason needs to have certain characters converted to strings that will display properly, but not be interpreted as HTML by the browser. An XSS FAQ recommends replacing the following characters: < > ( ) & and # with <, >, (, etc.
XSS vulnerabilities are one of the most commonly reported security issues with web applications today. New XSS techniques are discovered regularly that find new ways to evade various security measures implemented by the browser scripting languages and new ways to fool users into falling into an XSS trap. Any technique that allows attackers to run code in your browser with your permissions is obviously cause for worry. Website users can only take some fairly drastic measures to avoid XSS (turning off javascript, not following links, etc.). This is clearly something that website owners must handle to protect their users.
Brief items
Anti-virus to protect against anti-virus vulnerabilities
Users of the ClamAV free anti-virus system should be aware of the recent vulnerabilities in that package. No need to fear, however: SonicWALL has announced that its (proprietary) anti-virus system is now equipped to shield your network from attempts to exploit one of those vulnerabilities. So ClamAV users need not actually apply the update - just layer another anti-virus package on top of it instead.
New vulnerabilities
clamav: multiple vulnerabilities
| Package(s): | clamav | CVE #(s): | CVE-2006-1614 CVE-2006-1615 CVE-2006-1630 | ||||||||||||||||||||
| Created: | April 6, 2006 | Updated: | April 12, 2006 | ||||||||||||||||||||
| Description: | The ClamAV anti-virus toolkit has three vulnerabilities. the PE header parser has an integer overflow problem, the logging code has format string vulnerabilities that may lead to the execution of arbitrary code, and the cli_bitset_set() function can be used to create a denial of service. | ||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||
doomsday: format string vulnerability
| Package(s): | doomsday | CVE #(s): | CVE-2006-1618 | ||||
| Created: | April 6, 2006 | Updated: | April 12, 2006 | ||||
| Description: | The doomsday gaming engine has a format string vulnerability that may be utilized by a remote attacker for the execution of arbitrary code. | ||||||
| Alerts: |
| ||||||
libimager-perl: denial of service
| Package(s): | libimager-perl | CVE #(s): | CVE-2006-0053 | ||||
| Created: | April 10, 2006 | Updated: | April 12, 2006 | ||||
| Description: | The libimager-perl Perl extension has a vulnerability in which maliciously created 4-channel JPEG images can cause a segmentation fault and cause a denial of service. | ||||||
| Alerts: |
| ||||||
mplayer: integer overflows
| Package(s): | mplayer | CVE #(s): | CVE-2006-1502 | ||||||||
| Created: | April 10, 2006 | Updated: | May 1, 2006 | ||||||||
| Description: | MPlayer 1.0pre7try2 has multiple integer overflow vulnerabilities. Remote attackers can maliciously craft an ASF file or an AVI file in order to cause a denial of service. | ||||||||||
| Alerts: |
| ||||||||||
openvpn: arbitrary code execution
| Package(s): | openvpn | CVE #(s): | CVE-2006-1629 | ||||||||
| Created: | April 11, 2006 | Updated: | April 27, 2006 | ||||||||
| Description: | OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. | ||||||||||
| Alerts: |
| ||||||||||
plone: unauthorized access
| Package(s): | plone | CVE #(s): | CVE-2006-1711 | ||||
| Created: | April 12, 2006 | Updated: | April 12, 2006 | ||||
| Description: | From the Debian advisory: "It was discovered that the Plone content management system lacks security declarations for three internal classes. This allows manipulation of user portraits by unprivileged users." | ||||||
| Alerts: |
| ||||||
xscreensaver: possible password exposure
| Package(s): | xscreensaver | CVE #(s): | CVE-2004-2655 | ||||||||
| Created: | April 11, 2006 | Updated: | May 24, 2006 | ||||||||
| Description: | In some cases, xscreensaver did not properly grab the keyboard when reading the password for unlocking the screen, so that the password was typed into the currently active application window. The only known vulnerable case was when xscreensaver activated while an rdesktop session was currently active. | ||||||||||
| Alerts: |
| ||||||||||
Resources
Slides: open standards and security
David A. Wheeler has posted the slides from his "open standards and security" talk [PDF]. When viewing, skip immediately to the middle, where you can find a second set of slides with added commentary. "In contrast, open standards make security possible. They enable continuous competition between suppliers, so you can now choose the supplier who provides adequate security. Suppliers now compete on security, so they will have to improve. The key is using open standards appropriately to enable competition."
Page editor: Jonathan Corbet
Next page:
Kernel development>>
