Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
 As a professional penetration tester, [...]
 The JSON service responds to GET requests , and there is a good chance that
 the service is also vulnerable to JSON Hijacking attacks.

That's... not how XSSI works.

To have a script inclusion vulnerability, you need to have a vanilla
GET response that contains some user-specific secrets that are
returned to the caller based on HTTP cookies (or, less likely, other
ambient credentials). For example, a script response that discloses
the contents of your mailbox or the list of private contacts would be
of concern.

Further, the response must be in a format that can be not only loaded,
but also inspected by another site opened in your browser; most types
of JSONP fall into this category, but JSON generally does not,
essentially because of how the meaning of { is overloaded in JS
depending on where it appears in a block of code.

Last but not least, the final piece of the puzzle is that the response
must be served at a URL that can be guessed by third parties who don't
have access to your account.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
 A hacker exploits a JSON (javascript) object that has information of interest 
 for example holding some values for cookies. A lot of times that exploits the 
 same policy origin. The JSON object returned from a server can be forged over 
 writing javascript function that create the object. This happens because of 
 the same origin policy problem in browsers that cannot say if js execution it 
 different for two different sites.

To be honest, I'm not sure I follow, but I'm fairly confident that my
original point stands. If you believe that well-formed JSON objects
without padding can be read across origins within the browser, I would
love to see more information about that. (In this particular case, it
still wouldn't matter because the response doesn't contain secrets,
but it would certainly break a good chunk of the Internet.) JSONP is a
different animal.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
 Is this treated with the same way that says that Remote File Inclusion is not 
 a security issue ?

I'm not sure how RFI came into play on this thread - the original
report wasn't about RFI.

I don't have an agenda here; I'm just trying to get to the bottom of
it and make sure that we converge on a common understanding of the
issue. As in any argument, it's fairly likely that one of us is wrong,
and I accept that it could very well be me - I have been wrong quite a
few times in my life, and it's always a valuable learning opportunity.

I think it's unfortunate that the thread has devolved into various
accusations and credential-slinging, because it reduces the likelihood
of such a productive outcome. Please feel free to ping me directly any
time, though - I'm happy to chat.

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
 The thread read Google vulnerabilities with PoC. From my understanding  it 
 was a RFI vulnerability on YouTube, and I voiced my support that this is a 
 vulnerability.

I don't think this is accurate, at least based on the standard
definition of RFI: a server-side scripting language - usually PHP -
accidentally executing a script fetched from a remote server because
it passed an attacker-controlled string to an API that allows both
local file paths and remote URLs.

The report talks about a different behavior: the ability for users to
upload video and non-video content using legitimate functionality of
the site, without a way to make the server do anything interesting
with the received data. This may or may not be interesting on its own
merit, but I think it's pretty far from RFI.

 I also explained a JSON Hijacking case as a follow up, and you said you 
 didn't follow.

Yup, I am genuinely not familiar with the attack vector that *I think*
you are describing, or why it would matter in this context. My earlier
message in this thread explains my reasoning (in essence, there are
certain conditions that have to be met for a typical XSSI bug, and I
don't think they are met here), but if my understanding is wrong, I'd
really like to learn about the proposed attack.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Michal Zalewski
 Zakewski,

 Thank you for your e-mail. I welcome all opinions, that are backed up by 
 evidences.

 I am not just a security researcher, I am also an academic in the field and 
 lecturer.

All right :-) Thank you for the overview of CIA triad. I don't think
there's a good probability that our thinking about this report will
converge - but if you see demand for the approach you are advocating
(be it in the academia or in the consulting business), I think that's
fair.

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Michal Zalewski
Oh, wow :-)

To put things in perspective, it probably helps to understand that
virtually all video hosting sites perform batch, queue-based
conversions of uploaded content. There is a good reason for this
design: video conversions are extremely CPU-intensive - and an
orderly, capped-throughput queue gives you much better resilience to
DoS attacks.

Alas, this model is not very user-friendly: it may take good 20
minutes to upload a clip to Vimeo over my lowly DSL connection, and
then another 40 to wait my turn in the conversion queue. If the video
I uploaded turns out to be in an unsupported format (I'm still using
MS-CRAM), I have just wasted an hour of my time. A simple workaround
would be for Vimeo to have a client-side check that flags obvious
problems before sending any data to the server. It's not a security
feature, but it minimizes my pain.

Does it make sense to duplicate this check on the server, too? You
could, but I don't think it adds real value: after all, the converter
will sooner or later perform the same check anyway. And for users who
want to take Vimeo down, uploading tons of cat videos makes more
sense: after all, converting them will cost more than just bailing out
early on an invalid file. As for other attacks you mention: it's
fairly easy to construct valid videos that also work as file archives,
HTML documents, or shell scripts.

Ultimately, sites that deal with user-supplied content often have to
make tough decisions that don't fit in the neat defitions of ISO
standards or academic papers of the old. Mechanisms such as quotas,
various abuse-detection heuristics, rapid scalability - and even user
education and good UX design - go hand-in-hand with more traditional
approaches to minimizing risk.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-13 Thread Michal Zalewski
 The only reasonable way to 'exploit' the bug is using youtube as a
 personal storage uploading non-video files to your own profile: so what?

That would require a way to retrieve the stored data, which - as I
understand - isn't possible here (although the report seems a bit
hard-to-parse). From what I recall, you can just upload a blob of data
and essentially see it disappear.

We do have quite a few services where you can legitimately upload and
share nearly-arbitrary content, though. Google Drive is a good
example.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-13 Thread Michal Zalewski
 If you were evil, you could upload huge blobs and just take up space on the 
 google servers.

Keep in mind that the upload functionality is there legitimately: you
can upload gigabytes of data to Youtube, Drive, Gmail, etc.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-13 Thread Michal Zalewski
Nicholas,

I remember my early years in the infosec community - and sadly, so do
some of the more seasoned readers of this list :-) Back then, I
thought that the only thing that mattered is the ability to find bugs.
But after some 18 years in the industry, I now know that there's an
even more important and elusive skill.

That skill boils down to having a robust mental model of what
constitutes a security flaw - and being able to explain your thinking
to others in a precise and internally consistent manner that convinces
others to act. We need this because the security of a system can't be
usefully described using abstract terms: even the academic definitions
ultimately boil down to saying the system is secure if it doesn't do
the things we *really* don't want it to do.

In this spirit, the term vulnerability is generally reserved for
behaviors that meet all of the following criteria:

1) The behavior must have negative consequences for at least one of
the legitimate stakeholders (users, service owners, etc),

2) The consequences must be widely seen as unexpected and unacceptable,

3) There must be a realistic chance of such a negative outcome,

4) The behavior must introduce substantial new risks that go beyond
the previously accepted trade-offs.

If we don't have that, we usually don't have a case, no matter how
clever the bug is.

Cheers (and happy hunting!),
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OT] pls ignore

2014-02-23 Thread Michal Zalewski
 Looks like root and intermediate certificate hashes to me
 I was guessing it was hashes to either one pre-compiled exploit with two
 architectures

No, if you look closely, it's pretty clear that it's a hash of
Gaurang's upcoming novel. A touching story of love between a vampire
and a small-town girl.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Clickjacking (?) on Facebook.com (Question)

2013-12-12 Thread Michal Zalewski
What is your exact concern?

One should obviously not enter their Facebook credentials while the
address bar shows darksecurity.de; after all, instead of framing
Facebook, you could just create a fake login form that looks just like
theirs.

Clickjacking is a distinct concern, but generally only in cases where
a UI action with serious consequences (e.g., deleting your account,
sharing something with a stranger) can be accomplished in one or
several clicks. The pages you are framing don't seem to fall into this
category. It's worth noting that XFO doesn't fully eliminate the risk:

http://lcamtuf.blogspot.com/2011/12/x-frame-options-or-solving-wrong.html

An interesting consequence of pages that show your login or other
personal information, and can be framed, is that they make phishing a
bit easier: you can cleverly arrange them to imply that the top-level
page knows who you are. But the gain here probably isn't dramatic.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Clickjacking (?) on Facebook.com (Question)

2013-12-12 Thread Michal Zalewski
 That page allows drag-and-drop of the user's name. If you can convince the 
 user
 to select his name with a triple-click and then do a drag-and-drop of that 
 name to
 some place outside the iframe, you can find out his name, so I'd say it's a 
 privacy
 leak.

I had something to do with Chrome, Safari, and Firefox disallowing
cross-domain drag-and-drop:

http://lcamtuf.coredump.cx/dnd/

We have pinged Microsoft long time ago about this, too - and hopefully
this will be resolved on their end (at that rate, somewhere by year
2032).

But I wouldn't consider it a failing on part of the targeted website -
you'd need to put essentially everything behind XFO to fix this
problem on application level, which is not feasible for a good number
of websites (including FB, because they have a variety of gadgets that
are meant to be framed).

 Yeah, Chromium has protections against that, but they're not exactly
 bulletproof – they become useless as soon as there's a single page on the
 victim domain that is framable and somehow lets the user publish data.

Well, honestly, that becomes a bit of a stretch - if there's a good
PoC you can put together for Facebook specifically, I suspect it may
convince them to fix this, though.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Clickjacking (?) on Facebook.com (Question)

2013-12-12 Thread Michal Zalewski
 But I wouldn't consider it a failing on part of the targeted website -
 you'd need to put essentially everything behind XFO to fix this
 problem on application level, which is not feasible for a good number
 of websites (including FB, because they have a variety of gadgets that
 are meant to be framed).

 Or use JS to make it impossible to select text or so.

Doesn't work for non-HTML content, such as JSON responses, images, etc :-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Clickjacking (?) on Facebook.com (Question)

2013-12-12 Thread Michal Zalewski
 Doesn't Google always send JSON with Content-Disposition: attachment or so
 because of that?

One of the reasons (there's also content sniffing, etc). But then,
consider view-source:, too - you can use it in Firefox to render the
source of a HTML page in a frame (Chrome no longer lets you use
view-source within frames).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] bugs in IJG jpeg6b libjpeg-turbo

2013-11-12 Thread Michal Zalewski
Dearly beloved,

So, for one reason or another, the IJG jpeg library has gained some
notoriety as one of the most robust pieces of complex,
security-critical C code. Despite countless fuzzing efforts, I don't
recall any reports of serious vulnerabilities at least since the
release of jpeg6b in 1998 (that's still the most commonly-used version
of that library). Compared to the track record of libraries such as
libpng or libtiff, that's quite a feat.

Well, as it happens, jpeg6b and some of its optimized clones (e.g.,
libjpeg-turbo) will use uninitialized memory when decoding images with
missing SOS data for the luminance component (Y) in presence of valid
chroma data (Cr, Cb). Here's a nice PoC for Chrome, Firefox  Safari,
with fixes shipping as we speak (CVE-2013-6629):

http://lcamtuf.coredump.cx/jpeg_leak/

Funnily enough, as we were investigating this finding, we noticed that
the problem has been independently spotted back in 2003, but not
recognized as a security issue:

http://bugs.ghostscript.com/show_bug.cgi?id=686980

The patch developed by Ghotscript folks to fix rendering problems with
a particular document apparently ended up in limbo until 2013, at
which point it was incorporated into a relatively little-used version
9 of IJG jpeg. As far as I can tell, there are no changelog entries
associated with this fix.

Anyway, if you're using libjpeg-turbo, jpeg6b, or any derived code,
you probably want to backport the changes to get_sos() in jdmarker.c.
Look for the section that talks about checking for unique component
IDs. A new version of libjpeg-turbo will probably fix this upstream
soon. I wouldn't expect upstream fixes to jpeg6b itself.

...

While we're on the topic of JPEG libraries... a bit less
interestingly, there is also a separate but similar issue in the
handling of Huffman tables in libjpeg-turbo. This one apparently does
not affect IJG jpeg, and doesn't such a colorful history to go with
it. A raw image illustrating the problem (CVE-2013-6630) is here:

http://lcamtuf.coredump.cx/jpeg_leak/turbo-dht.jpg

A simple fix for this is to locate get_dht in jdmarker.c and make sure
that the huffval[] table is zeroed before use.

...

Well, that's it. As far as the impact goes, similar info leaks have
been previously shown to allow a variety of things in the browser
environment, including cookie theft or bypassing ASLR; see
http://vexillium.org/?sec-ff for one cool example.

The general case of code that performs one-shot image conversions in a
separate process is of minimal concern; in-process or multi-shot
conversions can be problematic. Converters that do not directly decode
user-supplied JPEGs should be OK.

PS. If you're interested about the tool used to generate and isolate
these inputs, check out http://code.google.com/p/american-fuzzy-lop/

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] CALEA Re: XKeyscore

2013-08-13 Thread Michal Purzynski

On 8/12/13 3:07 PM, Pedro Luis Karrasquillo wrote:

That was really funny and tongue-in-cheek, michal!
I really enjoyed your response, put a grin in my face in this grimy 
Monday...
you encourage me to turn off the digest delivery and receive the 
responses as they happen instead... great list to receive real time if 
you are into SM and getting trolled hard by very smart people!



Happy to make you happy! :-)
On slide 7 they show a red dot over Venezuela. You think Chavez let 
the spooks tap into the fiber there too? Where does the fiber tap 
connect to? Oh wait, there is a red dot over Moscow too...
The red dots are basically showing places where NSA can intercept 
communication. Any communication. Ever heard about radio links?


Oh wait, NSA was intercepting Soviet communication for ages, including 
the private phone from communist leaders car phone. I bet they didn't 
agree, either ;)


tborland nailed it with the links he sent... you do not need tons of 
copper, glass mirrors, nor Mulder  Scully on the case to do this. No 
need to ship immediate data to Utah or any other central location 
either. Data could be indexed locally and only the relevant keywords 
posted to CC. Ever heard of distributed computing? Nobody dumps CDR 
data to tape to hand it over to mediation any more. Oh, wait... the 
DACS is still connected to that Okidata Dot matrix printer and the ink 
tape needs to be changed... bye.


Man, you just created a mental loop in what you said. So, two lines 
earlier you said Chavez / Putin would not allow them to intercept 
communication by means of taping cables and now you are saying that ... 
NSA was able to install a quite complicated distributed architecture in 
Moscow. I'm sure mr Putin would be happy to talk with you and it might 
be an experience you could brag about all day and night long. You should 
definitely call him.


You don't need to intercept Russian traffic in Russia. Ever heard about 
Internet Exchange Points? The traffic will, sooner or later, leave the 
country. And if it does not, and stays local, and you have no local 
means, you are out of luck. No magic there, only a network design.


Cisco architecture is there, like there are many others. And it's just 
one of the brands. You just use best means you have for the situation. 
And it's accidentally managed by SNMP... so what? It could be telnet, 
who cares.


These days you just mix and match all the technologies you have for 
intercepting. And whenever you can tap the cable, you do it, because it 
gives you the best bang for the buck.


Red dots are most likely (guessing here) - we can have data from there. 
It does not mean everything but something. To show off to everyone how 
great we, the NSA are. What the heck, you need slides like that for the 
budget planning.


Seriously, decide what do you want to say ;)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] CALEA Re: XKeyscore

2013-08-13 Thread Michal Purzynski

On 8/12/13 4:57 PM, Pedro Luis Karrasquillo wrote:


Man, you just created a mental loop in what you said. So, two lines 
earlier you said Chavez / Putin would not allow them to intercept 
communication by means of taping cables and now you are saying that


Oh noes! CRC error detected. You just had a buffer overflow. Sorry I 
caused you to loop up. I never said Putin or Chavez would be in a 
position to agree or disagree with anything. Especially Chavez now 
that he is fertilizing the sugar cane.  Certainly a CALEA kind of 
intercept is not the only tool they could use. I just do not think 
that fiber tapping is the easiest way. It is certainly one of the 
ways, but getting the info via a backdoor is really much easier where 
feasible, like in unfriendly states. The backdoor being the CALEA 
capability.


Don't be afraid, I'm fine - my brain has a recent copy of PaX and 
everything here is PIE compiled. NX enabled, 100% ASLR, no information 
leaks at all, no JIT generation allowed. Utopia!


You can't use CALEA in Venezuela easily. Read on, to learn why. Same 
goes for Russia.


 Cisco architecture is there, like there are many others. And it's 
just one of the brands. You just use best means you have for the 
situation. And it's accidentally managed by SNMP... so what? It could 
be telnet, who cares. These days you just mix and match all the 
technologies you have for intercepting. And whenever you can tap the 
cable, you do it, because it gives you the best bang for the buck.


Exactly my point. Not sure why you all got so worked up about me 
pointing out that there are easier ways to do this than tap a fiber. 
Tapping a fiber is a good idea if there is not an easier less 
intrusive way. The spooks could not care less about money, it is all 
about getting it done without getting noticed.


I see... you misunderstood the documentation. Go and read it again.

You're trying to tell that CALEA is a backdoor that NSA can use all the 
time to get traffic. And here's why not:
1. It's a set of SNMP commands efficiently configuring a filter doing 
'find me all this data, and ship here'. Kind of a span port with a 
filter. Over-engineered, BTW.
2. Being SNMP it must be configured befored used. Yes, I've read all the 
documentation - fascinating lecture, I have to say!
3. When was the last time you've seen SNMP opened to the public? Been a 
while here. And even if, the whole CALEA capability must be configured 
_before_ used. Not something you can do by accident, and _not_ running 
by default either.
4. There's a lot of additional gear to accept the intercepted traffic 
and ship it further. It needs to be installed somewhere, before you can 
monitor things.
5. There's a lot of data everywhere these times. You cannot monitor 
entire ISP this way, or they would need to keep a few Gbits of spare 
bandwidth just for the NSA. Actualy, I'd make a deal with them - you 
guys in a tasteless black suits pay for all my bandwidth and I can give 
you half ;) Local processing, you say? Distributed computing? Mr Putin 
won't allow you. Shipping all the traffic to a friendly country to 
process there? Say, Germany? Sure, and no-one from the Russian ISP would 
ever notice? Especially, that the CALEA traffic is visible as a hell - 
being either UDP or IPSEC.
6. Cisco says it puts the load on a CPU. And it does. Now, the routing 
engines even in expensive modern network gears aren't exactly the speed 
beasts. My phone leaves them in the dust. How much traffic can you 
extract this way, making the CPU work three times harder, before it 
starts dropping BGP sessions?


To sum up - sure, you can use CALEA to extract traffic in a limited way. 
Say a few VOIP sessions. But in order for that to happen you need to 
have the agreement with the ISP, put your gear there, have it configured 
an than you can have fun.


But CALEA isn't a backdoor, that NSA has put everywhere to miraculously 
ship all the traffic to them. Say I have a few of Cisco routers - they 
cannot send me a magic packet and expect traffic to be sent to them. And 
yes, I know my traffic levels very well, and so does our NOC team - 
let's say the NSA copies everything - that means I have twice the 
traffic suddenly. I'd be waken up in a middle of the night by the NOC 
people to investigate if something like this would happen.


Red dots? Tap the fibre in decix and there's for sure some communication 
from Moscow. So you can say you get some Moscow traffic and put a red 
spot there.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure

2013-08-11 Thread Michal Zalewski
 for doing this features in httpd.conf you can use AllowOverride None instead
 of AllowOverride all

AllowSymlinks is a red herring here (hardlinks should do, unless you
have stuff partitioned in a very thoughtful way, which most don't),
similarly to suexec.

In general, sharing web hosting providers that allow shell access or
scripting are pretty much boned in a myriad of ways.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING you do

2013-08-11 Thread Michal Purzynski

On 8/11/13 4:16 AM, Pedro Luis Karrasquillo wrote:

TAPs are no longer physical devices a spy installs on a wire somewhere.
NSA picks this up remotely via a very secret SNMP command. I explained 
this in detail here: 
http://dustupblog.com/2013/06/11/privacy-in-america-is-a-myth-lets-thank-ourselves/


I been in networking since 1996...


And never got my 5 minutes of fame, so decided to try here. Bad idea, I 
would say, too many smart people here.


That's actualy a very laughable, so I enjoyed it!

So, NSA throws a super secret black boxes everywhere. They have to be 
black, so the spy-climate is dense enough.


You are in networking from so long, tell me than. In order to intercept 
a lot of traffic, would you rather do it like described and spent lots 
of money, do a lots of cabling (packets needs them, you know?) and 
maintain tons of the boxes, or just tap fibres and get the same packets 
wholesale?


That would be a very, very bad design to do the number 1 design. Taping 
is just easier and there's less people involved.


Also, that's even more funny, because we actualy know that SNMP and MIB 
are for and it just blowns your story. How do you monitor packets via 
SNMP? Say, you have your top secret command and the 
router/switch/firewall starts shipping packets to NSA... but WHERE? How 
do they appear on a target box? Magic? UFO? Mind reading?


You would need a CABLE from MANY devices to your collecting server. Too 
many of them to make it possible. Kind of a span port I guess. But you 
would overflow it quickly, too. So you need many span ports from each of 
the devices... so many that next time I make a business plan and buy a 
new network gear, I will have to factor that in and add a we need 10 
more ports for NSA, but don't ask about it.


BTW, I've figured out the Top Super Secret Umbra Venona key. It's 
described here, in plaintext.


https://kb.juniper.net/InfoCenter/index?page=contentid=KB10878

Now, NSA will have all of us killed. Too bad I'm in the car, might be 
able to escape. Let me turn off all my cellphones or even throw them 
away, just in case. Or maybe abandon my car, and walk - looking over my 
shoulder from time to time and taking a circular route.


So, you don't need a secret SNMP command, you can just configure your 
span port / mirroring port. In order to intercept that amount of traffic 
you would need to span so many devices that it's impossible. See also 
the span port overflow remark.


Oh and bad shoot with the MIBs too. They are just ... numbers 
representing what kind of info do you want (more or less). There's no 
magic either.


Of course, because you need so many span ports, it's a worldwide 
conspiracy among most of the ISP network engineers - someone has to 
connect the cable, you know. Or is the cable translucent and invisible? 
And connected to the invisible port, too? Now I feel that all these 
years I've been working at ISP I was missing out a lot of crazy and 
fancy work!


SURE they are intercepting lots of data, but doing it in a most smart 
and efficient way possible - they got some Big Brainz behind it, too.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING you do online

2013-08-02 Thread Michal Purzynski

On 8/2/13 1:21 PM, Gary Baribault wrote:
Having access to the building is ok, but you still need to sniff the 
fibre, and in a centre like that any tap would be found quickly by one 
tech or another .. the guys from NANOG are good, so the deal must be 
with the carriers.



The guys from NANOG are great indeed, but that's way above them :)

Deal with carrier is a one thing, silent deals with IX another. And 
surely they do both. You can also tap in many places when cable is going 
from/to the ocean (needs a carrier deal, so what? Easy.)


Also, there's a lot of carrier connectivity on wireless - think 
satellite, or directed micro waves links. It's much easier to use a 
satelite for say, a phone calls than connecting your XX islands with a 
fibre.


Guess what these guys are doing:
1. https://en.wikipedia.org/wiki/Special_Collection_Service
2. FORNSAT
3. SSO, which is the Special Source Operations division, the branch of 
NSA which taps cables, finds microwave paths, and otherwise collects 
data not generated by F6 or foreign satellites. (from Wikipedia)


I just wonder how many of the under water cable repairs were caused by 
a real incidents, and how many not really ;) There's no magic, you need 
to disconnect the cable for a while to tap it.

If it's a 'legit' connection then No Problèmo

Gary B

 On 08/02/2013 07:04 AM, Joseph Jackson wrote:


Why would they need to peer with all tier 1s?  If you get access to 
the major exchange points (1 wilshire, 60 hudson, etc) you will get 
the majority of traffic.


*From:*Full-Disclosure 
[mailto:full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *XF

*Sent:* Thursday, August 01, 2013 3:47 PM
*To:* Gary Baribault
*Cc:* full-disclosure@lists.grok.org.uk
*Subject:* Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING 
you do online


So you think this is real ? All Tiers 1 would be partner with NSA ? 
Even in Europ ? This sound crazy



Le 1 août 2013 à 22:19, Gary Baribault g...@baribault.net 
mailto:g...@baribault.net a écrit :


Don't forget that they also have to back haul that data to their
data centres !! They would have to have secret agreements with
all of the Tier 1 carriers. Sure sounds far fetched!

Gary B


On 08/01/2013 03:51 PM, XF wrote:

Right. But where are their tap ? In Internet Exchange Point ?
In AS ? And how can they do that ? Hello, I'm NSA, can I get
a TAP on your network :-)  This would say that ISP agree and
the amount of data to transfer would be so vast . How can
they transfer all this amount of data into their system ??


Le 1 août 2013 à 20:56, Gary Baribault g...@baribault.net
mailto:g...@baribault.net a écrit :

Optically tapping ALL of the submarine cable going into
and out of the U.S. would still not give them ALL of the
claimed data. They have to be tapping all of the major
traffic exchange sites in the U.S. to get this kind of data.

Gary B

 On 08/01/2013 11:31 AM, XF wrote:
 Did you understood how

they collect data ? This is not clear for
me...ISP backdoor

? Optical tap on sub marine wire ?



 Le 1 août 2013 à 16:26, Georgi Guninski
gunin...@guninski.com mailto:gunin...@guninski.com

a écrit :



 it will be interesting to me what will
remain of

the nsa

 when the chinese comrades stop giving
fresh money

to the usa.



 Detroit news are not very pink.



 On Thu, Aug 01, 2013 at 11:20:27PM +1200, Hugh

Davenport wrote:

 meanwhile, in new zealand, prime minister

suggests that we aren't

 the slaves for nsa...



 On 2013-08-01 19:23, Georgi Guninski wrote:

 XKeyscore sees 'nearly EVERYTHING you do

online






http://www.theregister.co.uk/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/

 New NSA tool exposed: XKeyscore sees

'nearly EVERYTHING you do online'



 From the presentation:

 * Show me all the exploitable machines in

country X



 * How do I find a cell of terrorust that

has no

 connection to known strong-selectors

 

Re: [Full-disclosure] Denial of Service in WordPress

2013-06-29 Thread Michal Zalewski
 I.e. this is 21 times / infinite times more effective for attack.

Not really, in terms of the bandwidth you can use up / the number of
requests you can create. You're essentially trading this:

for (var i = 0; i  whatever; i++) {
   var x = new XMLHttpRequest(); /* or new Image() or whatever */
   ...
}

...for this:

for (var i = 0; i  whatever / redirect_limit; i++) {
  for (var j = 0; j  redirect_limit; j++) { /* implicit loop */
...
  }
}

...and it shouldn't matter.

You can generate a ton of expensive traffic from within JS these days.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Denial of Service in WordPress

2013-06-28 Thread Michal Zalewski
 Attack exactly overload web sites presented in endless loop of redirects. As
 I showed in all cases of Looped DoS vulnerabilities in web sites and web
 applications, which I wrote about during 2008 (when I created this type of
 attacks) - 2013.

You do realize that any browser can be made to issue a *lot* of
requests to any other destination on the web - say, by instantiating a
bunch of images, leveraging CORS, navigating iframes, etc?

Browsers detect redirect loops to prevent accidental mishaps and
simplify troubleshooting, not to stop malicious attacks.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Paypal Bug Bounty #31 - Mail Encoding Web Vulnerability

2013-05-12 Thread Michal Zalewski
Total word count: ~1065
Words that provide relevant information about the bug: ~95

/mz
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Using CSS :visited to steal your history (again, zzzz...)

2013-05-05 Thread Michal Zalewski
I guess this may be somewhat amusing...

As you probably know, most browser vendors have fixed the ability to
enumerate your browsing history through the CSS :visited
pseudo-selector. The fix severely constraints the styling possible for
visited links, and hides it from APIs such as
window.getComputedStyle() [1].

The fix does not prevent attackers from extracting similar information
through cache timing [2], or by examining onerror / onload events for
scripts and images loaded from sites to which you may be logged in.
Nevertheless, the :visited attack is particularly versatile and
reliable, so several people have tried to circumvent the fix by
showing the user a set of hyperlinked snippets of text that, depending
on the browsing history, will blend with the background or remain
visible on the screen. Their visibility can be then indirectly
measured by seeing how the user interacts with the page.

The problem with these attacks is that they are either unrealistic, or
extremely low-throughput. So, here is a slightly more interesting
entry for this contest. The PoC works in Chrome and Firefox, but
should be easily portable to other browsers:

http://lcamtuf.coredump.cx/yahh/

The basic idea behind this inferior clone of Asteroids is that we hurl
a lot of link-based asteroids toward your spaceship, but you only
see (and take down) the ones that correspond to the sites you have
visited. There are several tricks to maintain immersion, including
some proportion of real asteroids that the application is sure are
visible to you. The approach is easily scalable to hundreds or
thousands of URLs that can be tested very quickly, as discussed here:

http://lcamtuf.blogspot.com/2013/05/some-harmless-old-fashioned-fun-with-css.html

Captain Obvious signing off,
/mz

[1] https://developer.mozilla.org/en-US/docs/CSS/:visited
[2] http://lcamtuf.blogspot.com/2011/12/css-visited-may-be-bit-overrated.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WowzaMediaServer StorageDir escape (regression)

2013-04-30 Thread Michal J.
Product: Wowza Media Server
URL: http://www.wowza.com/
Description: WMS is a quite popular RTMP/HLS/HDS/RTSP streaming server

Issue:

In early 2009 I reported problem with processing of requests with
relative paths.

The issue surfaced again.

In a nutshell, you can escape Applications StorageDir using relative
path.

Lets say you have two applications:

* vod1 with /usr/local/WowzaMediaServer/content1/ as StorageDir
* vod2 with /usr/local/WowzaMediaServer/content2/ as StorageDir

Requesting to play `mp4:../content1/file.mp4` from `vod2` will work
just fine thus bypassing configured StorageDir.

Possible workarounds:

* Implement custom module that supplies either
  `IMediaStreamNameAliasProvider2` or `IMediaStreamFileMapper` override
  which blocks requests falling outside configured `StorageDir`
* Use StreamNameAlias module to block requests with relative paths
* Upgrade to Wowza 3.5.2.06 (patch that hopefully fixes this issue)
* Don't use predictable paths

Timeline:

* 2013-04-06 Wowza Media Services contacted about this issue
* 2013-04-08 Wowza acknowledges this bug, no further info received
* 2013-04-30 Public release due to vendor's non-cooperation

M.
-- 
Michal J. wejn(at)box.cz
I honestly think it is better to be a failure at something you love
than to be a success at something you hate... -- George Burns

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WowzaMediaServer SecureToken bypass (and worse)

2013-04-30 Thread Michal J.
Product: Wowza Media Server
URL: http://www.wowza.com/
Description: WMS is a quite popular RTMP/HLS/HDS/RTSP streaming server

Issue:

By default all installations of WMS use four modules in their
application's config file: base, properties, logging, flvplayback.

I've found out that the `properties` module allows unauthenticated
attacker to get/set various properties (Client, MediaStream,
ApplicationInstance, and Application).

Since ApplicationInstance properties are commonly used to store sensitive
data (for instance `secureTokenSharedSecret` property used to secure
origin-edge and/or client-origin RTMP connections, backend credentials,
etc) this poses non-trivial risk.

Fetching the abovementioned `secureTokenSharedSecret` property from
the streaming server allows attacker to easily employ rtmpdump (and
the like) to dump VOD files and/or in extreme cases re-stream directly
from origin.

As a demo I've implemented straightforward patch to JWPlayer (popular
Flash player) that bypasses SecureToken protection on the fly. This
demo is available in a long-winded blog post at my company's website:

http://tinyurl.com/wontyoupleasethinkoftheusers

As for the `logging` module, this can be used to fill logfile with
nonsensical log entries (and worse).

Workaround:

Disable both `properties` and `logging` modules unless you absolutely
need them (99% of the people running WMS probably don't) or wait for
vendor fix.

Timeline:

* 2013-04-06 Wowza Media Services contacted about this issue
* 2013-04-08 Wowza rep states that this is a non-issue and accuses me of
  scaremongering
* 2013-04-19 After subsequent rounds of communication, Wowza rep threatens
  to reevaluate my independent consultant status if this info disclosed
* 2013-04-27 Contacting Wowza rep with non-public preview of this post
  including the JWPlayer demo (last shot at responsible disclosure)
* 2013-04-28 Wowza rep responds with more indirect threats, info that this
  will be resolved sometime in the future and a plea won't you please think
  of the users
* 2013-04-30 Public release due to vendor's non-cooperation

M.
-- 
Michal J. wejn(at)box.cz
I honestly think it is better to be a failure at something you love
than to be a success at something you hate... -- George Burns

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Allegro.pl XSS [0-day]

2013-04-14 Thread Michal Zalewski
 CVSS2 define a standard XSS ~4.3/10, more critical are CSRF ~6.8 or Open
Redirect ~5.8

head explodes
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Exploiting sibling domains cookie isolation policy to DoS CDN users

2013-04-11 Thread Michal Zalewski
This is fairly well-known, I think; for example, there's a mention of this
here (search for appspot.com):

http://lcamtuf.blogspot.com/2010/10/http-cookies-or-how-not-to-design.html

I think it's also covered in The Tangled Web; it's also why you see
domains such as blogspot.com and appspot.com in PSL:

http://mxr.mozilla.org/mozilla-central/source/netwerk/dns/effective_tld_names.dat?raw=1

/mz
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [0 Day] XSS Persistent in Blogspot of Google

2013-01-28 Thread Michal Zalewski

 OGMMM WTFF 0DAY XSS
 Sorry, getting a bit tired of these.


Well, the world is changing. You can probably do a lot more direct damage
with a (legit) XSS in a high-value site than with a local privilege
escalation in sudo.

XSS reports are less actionable for the average reader, but full disclosure
is probably still beneficial, in that it provides data points about the
types of flaws a particular vendor happens to have, and the speed and
quality of the deployed fixes.

Of course, many of the XSS reports in knorr.com and similarly exciting
destinations are zz...

/mz
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] OT Google raises sploit bounties

2012-11-28 Thread Michal Zalewski
 I would be interested what bounties they would pay
 for operation Аврора or for a botnet of say 1M host.

Reward amounts are public; for example, here are the rules for the web
app program:

http://www.google.com/about/appsecurity/reward-program/

Neither malware on user machines nor attacking employees is within
scope, though: the program is mostly about recognizing original
research into potential design and implementation flaws in our code.

We occasionally decide to extend rewards of some sort to people who
report very interesting or sensitive issues that fall outside the
scope of the existing programs, but we don't offer Microsoft-style
bounties for identifying malware authors, etc.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] OT Google raises sploit bounties

2012-11-25 Thread Michal Zalewski
 His question seemed pretty clear to me. As indicated in the article he
 linked to, Google apparently raised their bounty/reward. He's asking if
 something happened to one of their products to cause that, or if they're
 just paranoid (and maybe expecting something to happen to one of their
 products).

FWIW, these choices seem weird... for any announcement of that sort,
it seems more rational to assume any of the following:

1) It's getting harder to find bugs. Reward amounts correspond to the
average time needed to locate a vuln.

2) More reward programs are competing for a fixed pool of skilled
researchers. Reward amounts are just bids for their time.

3) Incoming reports are surprisingly good. Reward amounts are set to
recognize high quality work.

4) The vendor thinks that their product is bulletproof, and uses
increasing reward amounts as a publicity stunt.

As far as I know, all reward increases for Google VRPs were driven by
a combination of factors 1 through 3.

I am not sure how being paranoid factors in - complex products have
bugs, browsers doubly so. Similarly, malware seems like a weird reason
to bump up rewards.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [oss-security] Re: [OVSA20121112] OpenVAS Manager Vulnerable To Command Injection

2012-11-14 Thread Michal Ambroz
Hello Jan,

in version 2.0.5 the discussed vulnerable like looks like this:
 command = g_strdup_printf (/bin/sh %s %s  %s
  2 /dev/null,
 script,
 xml_file,
 output_file);

So there is not IP and PORT to be sanitized so 2.0.5 is probably on the safe 
side of this vulnerability.

If you deem it safer we can bump to current 3.0.x version - I know it is 
usually nono, but there should be no casualties,
since I sincerely doubt there are _ANY_ openvas users on Fedora distribution 
(16/17) as half of the openvas suite packages is still under review. 

Mainly the openvas suite doesn't work on current Fedora due to incompatibility 
between openvas network stack (openvas-libraries) and the gnutls library we 
have in Fedora.

Best regards
Michal Ambroz 
(one of Fedora openvas-* packagers)




  Původní zpráva 
 Od: Jan Lieskovsky jlies...@redhat.com
 Předmět: Re: [oss-security] Re: [OVSA20121112] OpenVAS Manager Vulnerable To
 Command Injection
 Datum: 14.11.2012 11:55:09
 
 Hello Tim,
 
   thank you for the heads up and notification.
 
 The versions of openvas-manager package, as shipped with Fedora release of 16
 and release of 17 is based on upstream 2.0.5 version yet. From what I have
 looked
 and can tell from upstream advisory and patch (for 3.0.X version):
 [1] http://www.openvas.org/OVSA20121112.html
 [2]
 http://wald.intevation.org/scm/viewvc.php?view=revroot=openvasrevision=14437
 
 the CVE-2012-5520 does not seem to be applicable to OpenVAS-4 / 
openvas-manager
 2.0.5
 version yet:
 [3]
 
http://lists.wald.intevation.org/pipermail/openvas-announce/2012-August/000140.html
 
 But prior definitely classifying Fedora 16 and Fedora 17 openvas-manager 
package
 versions
 as not vulnerable to this issue, I would like to hear opinion / confirmation
 from someone
 more familiar with OpenVAS code.
 
 So could you confirm the CVE-2012-5520 wouldn't affect OpenVAS-4 2.0.X version
 (yet)?
 
 Thank you  Regards, Jan.
 --
 Jan iankko Lieskovsky / Red Hat Security Response Team
 
 - Original Message -
 Doh, a document gets proof read by multiple people and yet it contains a 
 mistake.  In the Current Status section of the advisory, the date is 
 incorrect.  A corrected advisory is attached.
 
 Tim
 -- 
 Tim Brown
 mailto:timb@openvas,org
 http://www.openvas.org/
 
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-11 Thread Michal Zalewski
The only thing I am saying is that when you have a choice between
direct root logins and using sudo / su, telling people to use the
latter option for security reasons actually makes them worse off.

Poor corporate security practices, schizophrenic account lockout
policies, or dealing with hundreds of administrators on a single box
are completely tangential to that (though you can have as many uid 0
accounts as you want).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-10 Thread Michal Zalewski
 Using su to execute commands as an untrusted user from an interactive
 shell may allow the untrusted user to escalate privileges to the user
 running the shell.

If you have the ability to execute code on that terminal before the
user executes su, it is also possible to simply never allow the real
su application to run until you've already captured the credentials and
escalated to root. For example, you could define an alias or
change PATH in the shell; ptrace the shell or use LD_PRELOAD to change
its semantics; or simply never return to the shell at all, and simply
fake all the subsequent interactions with it (not particularly hard to
do this in a convincing way).

This is why I find the standard security mantra of disable root
logins and use su / sudo to be extremely silly.

In general, very few OSes are designed to handle such scenarios gracefully.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-10 Thread Michal Zalewski
 I think you've taken that far too literaly. My understanding of it is to
 protect against a) brute force retardation b) dumb attackers.

The advice weakens the security of your system, because it means I
just need to compromise your unprivileged account (in which you run
your browser, mail client, and so on) to own the entire box.

As for the benefits, care to elaborate? I'm not sure what a) and b)
really mean. If you're worried about brute-force, don't use trivial
passwords. If you worry about opportunistic attacks, do that and then
patch your stuff every now and then.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] How much time is appropriate for fixing a bug?

2012-07-08 Thread Michal Zalewski
 Wikipedia says 5 months: http://en.wikipedia.org/wiki/Responsible_disclosure

Well, the encyclopedia has spoken. So it's settled then.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] things you can do with downloads

2012-05-30 Thread Michal Zalewski
Another moderately interesting tidbit, I guess...

It is an important and little-known property of web browsers that one
document can always navigate other, non-same-origin windows to
arbitrary URLs. Perhaps more interestingly, you can also navigate
third-party documents to resources served with Content-Disposition:
attachment, in which case, you get the original contents of the
address bar, plus a rogue download prompt attached to an unsuspecting
page that never wanted you to download that file.

PoC:
http://lcamtuf.coredump.cx/fldl/

More info:
http://lcamtuf.blogspot.com/2012/05/yes-you-can-have-fun-with-downloads.html

It's closely related to many other fundamental, open issues with
browser UI design - but I guess it's an interesting highlight.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're now paying up to $20, 000 for web vulns in our services

2012-04-24 Thread Michal Zalewski
 IMHO, anyone who willingly, knowingly places customer data at risk by 
 inviting attacks on their production systems is playing a very dangerous 
 game. There is no guarantee that a vuln discovered by a truly honest 
 researcher couldn't become a weapon for the dishonest researcher through 
 secondary discovery

I'm not sure I follow. Are you saying that the dishonest researcher
will not try to find vulnerabilities if there is no reward program for
the honest ones?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're now paying up to $20, 000 for web vulns in our services

2012-04-24 Thread Michal Zalewski
 A you-only-get-it-when-successful 20,000$ budget from Google is
 insulting, considering the perhaps massive time investment from
 the researcher. [...] and yet they only pay a nice researcher 20
 grand? You can't even live on that. Researchers aren't just kids
 with no responsibilities, they have mortgages and families

People who want to make a living helping to improve Google security
are welcome to apply for a job :-) We have a remarkably large and
interesting security team.

The program simply serves to complement that (and some other,
contract-driven efforts), and it works for quite a few people who see
it as a way to do something useful on the side, and get compensated
for it, too.

Now, I have done a fair amount of vulnerability research in my life, I
do have a family and a mortgage - and I still wouldn't see $20k as an
insult; but I know that this is subjective. In that spirit, you are at
liberty to determine whether to participate, and how much time to
invest into the pursuit :-)

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Vulnerability research and exploit writing

2012-04-24 Thread Michal Zalewski
 Our interest is exploits which run over Windows 7, Snow Leopard with
 applications such MS Office, Adobe, Browsers, Media Player , Notepad etc

Well, good thing I have a stash of Notepad 0-days.

Most of them involve you saving a snippet of text as evil.bat and
clicking on it, though.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] FYI: We're now paying up to $20, 000 for web vulns in our services

2012-04-23 Thread Michal Zalewski
Hey,

Hopefully this won't offend the moderators:

http://googleonlinesecurity.blogspot.com/2012/04/spurring-more-vulnerability-research.html

I suspect I know how the debate will be shaped - and I think I can
offer a personal insight. I helped shape our vulnerability reward
program from the start (November 2010), and I was surprised to see
that simply having an honest, no-nonsense, and highly responsive
process like this... well, it works for a surprisingly high number of
skilled researchers, even if you start with relatively modest rewards.

This puts an interesting spin on the conundrum of the black / gray
market vulnerability trade: you can't realistically outcompete all
buyers of weaponized exploits, but you can make the issue a lot less
relevant. By having several orders of magnitude more people reporting
bugs through a white hat channel, you are probably making
underground vulnerabilities a lot harder to find, and fairly
short-lived.

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple IOS security issue pre-advisory record

2012-03-23 Thread Michal Zalewski
 I find it very unfortunate that 300 supposed security professionals clicked
 on a hidden link like that without first checking what it was, or if not
 simply ignoring it like I did!!!

So how do you meaningfully check what it is without actually
requesting the document?

And what's the difference between that post and a hidden img or
iframe included on a less obvious website?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fw: Earth to Facebook

2012-03-19 Thread Michal Zalewski
 The only other people that see the vulnerability are the select few in
 upSploit.

OK. You should probably document that, and make it clear that this
policy will not change without the reporter's explicit consent.

It's an interesting project - but you guys are working for security
software vendors and security consultancies, so I think it's important
to clarify.

 Use it once for something you may not care about to much and see how it
 works for you.

Well, that's not the point - the real question is what happens with
valuable vulnerabilities. But really, I'm not criticizing.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fw: Earth to Facebook

2012-03-18 Thread Michal Zalewski
 Without meaning to advertise, that is one of the reasons upSploit was
 created - so that you could submit a vulnerability and then upSploit
 automatically sends to the vendor. This way you and your friend don't have
 to do any of the work on the disclosure.

I clicked around and don't see any obvious explanation; other than the
reporter and the vendor, who else gets to see the submissions and
under what circumstances?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Pros and cons of 'Access-Control-Allow-Origin' header?

2012-02-22 Thread Michal Zalewski
 Does 'Access-Control-Allow-Origin' header provide any benefits in
 defending against cross site scripting attacks?

No. It's a mechanism to control cross-origin XMLHttpRequests (and some
other peripheral things), and adding it does not reduce the likelihood
or exploitability of XSS bugs.

If you use it incorrectly, you may end up removing most of the
security assurances provided by the same-origin policy, but that's a
separate topic.

 Doesn't 'Access-Control-Allow-Origin' header make any XSS flaw
 trivially exploitable? For example, if an attacker finds an XSS flaw
 in a web application, he can now inject a JavaScript with
 XMLHttpRequest that sends a request to attacker's web server which
 serves resources with the HTTP header Access-Control-Allow-Origin:
 *. The browser would see this header and fetch the resource from the
 attacker's web server.

If you have an XSS vulnerability, there are many simpler ways to relay
data to an attacker-controlled site without the need to use CORS.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] p0f3 release candidate

2012-01-16 Thread Michal Zalewski
So just for the record, version 3.00 is now officially out:
http://lcamtuf.coredump.cx/p03/. Many thanks to countless people who
submitted signatures and bug fixes, including:

  Phil Ames
  Jason DePriest
  Dalibor Dukic
  Mark Martinec
  Damien Miller
  Nibbler
  Bernhard Rabe
  Chris John Riley
  Sebastian Roschke
  Peter Valchev
  Jeff Weisberg

I won't be spamming the list with any further updates on p0f, but this
being a major rewrite after ~6 years, I thought it makes sense to let
people know - especially since the previous version is used in quite a
few abuse detection / monitoring / pentesting frameworks.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] p0f3 release candidate

2012-01-10 Thread Michal Zalewski
Hi folks,

I wanted to share the news of p0f v3, a complete rewrite and redesign
of my passive fingerprinting tool.

== Synopsis ==

P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind any
incidental TCP/IP communications (often as little as a single normal
SYN) without interfering in any way. Some of its capabilities include:

- Scalable and fast identification of the operating system and
software on both endpoints of a vanilla TCP connection - especially in
settings where NMap probes are blocked, too slow, unreliable, or would
simply set off alarms.

- Measurement of system uptime and network hookup, distance (including
topology behind NAT or packet filters), user language preferences, and
so on.

- Automated detection of connection sharing / NAT, load balancing, and
application-level proxying setups,

- Detection of dishonest clients / servers that forge declarative
statements such as X-Mailer or User-Agent.

The tool can be operated in the foreground or as a daemon, and offers
a simple real-time API for third-party components that wish to obtain
additional information about the actors they are talking to.

Common uses for p0f include reconnaissance during penetration tests;
routine network monitoring; detection of unauthorized network
interconnects in corporate environments; providing signals for abuse
prevention tools; and miscellaneous forensics.

== What's new ==

Version 3 is a complete rewrite, bringing you much improved SYN and
SYN+ACK fingerprinting capabilities, auto-calibrated uptime
measurements, completely redone databases and signatures, new API
design, IPv6 support (who knows, maybe it even works?), stateful
traffic inspection with thorough cross-correlation of collected data,
application-level fingerprinting modules (for HTTP now, more to come),
and a lot more.

== Download / demo ==

Please visit:
http://lcamtuf.coredump.cx/p0f3/

This is a release candidate, and my hope is to get folks to
contribute signatures and help squash bugs. If all goes according to
plan, this should progress to a final release in a week or two. Some
issues are expected, so please report problems off-the-list.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] OT: Firefox question / poll

2011-12-22 Thread Michal Zalewski
  https://media.blackhat.com/bh-us-10/presentations/Waisman/BlackHat-USA-2010-Waisman-APT-slides.pdf

From while (1); to APT in 10 posts. Good job :-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] OT: Firefox question / poll

2011-12-22 Thread Michal Zalewski
 Do you think that the Firefox warning: unresponsive script is meant
 as a security feature or a usability feature?

More seriously, though, it's a bit of an oddly-phrased question. Only
the author of the code knows the true intent; you can look up the
mention of this text in the code, and see what the text accompanying
that change was, or contact whoever made it.

What I can tell you is that there is no concerted effort by any of the
browser vendors to make DoS attacks on the browser difficult; and that
this particular prompt is trivially bypassable, too. Moreover, some of
the previously introduced CPU and memory restrictions on the
JavaScript engine have been removed in the past few years, and many of
the new APIs (such as history.pushState, window.postMessage, or
Worker) are specified and implemented with no particular DoS
mitigations.

And no, it's very unlikely for this prompt to reliably prevent any
practical attempts to exploit non-DoS vulnerabilities in the browser.

/mz

PS. The usual plug: If you are curious, I have a whole chapter on this
and other perhaps more interesting issues related to malicious scripts
in The Tangled Web.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] post-XSS landscape

2011-12-20 Thread Michal Zalewski
With the growing enthusiasm about CSP and other script containment
frameworks, I tried to put down some rough notes about the fundamental
exploitation vectors that would be available in absence of the ability
to execute scripts - and tried to see how these attacks correspond to
what XSS attacks are trying to achieve today.

So... this may be of some interest to the list:
http://lcamtuf.coredump.cx/postxss/

[ More background:
http://lcamtuf.blogspot.com/2011/12/notes-about-post-xss-world.html ]

/mz

PS. Cue snarky remarks from Tavis ;-)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] silly PoCs continue: X-Frame-Options give you less than expected

2011-12-10 Thread Michal Zalewski
At the risk of annoying everyone...

I think we greatly underappreciate the extent to which JavaScript
allows you to exploit the limits of human perception. On modern
high-performance systems, windows can be opened, positioned, and
closed; and documents loaded and then navigated away from; so quickly
that we can't even reliably notice that, let alone react consciously.

The PoC I posted here earlier this week
(http://lcamtuf.coredump.cx/switch/) demonstrates one example of page
transitions occurring so fast that you don't register it; and some of
my earlier posts outlined the exploitation of page switching to
exploit browser UIs (e.g. http://lcamtuf.coredump.cx/ffgeo2/). Today,
I wanted to share this brief demonstration of an attack that should
hopefully illustrate why our current way of thinking about
clickjacking (and the possible defenses, such as X-Frame-Options) is
flawed:

http://lcamtuf.coredump.cx/clickit/

The basic idea here is that instead of placing the UI you want to
tamper with in an invisible or only partly-visible iframe, you can
achieve a similar effect simply by predicting the time of a
premeditated click (which is fairly easy if you look at mouse velocity
and distance to the expected destination), and then either destroying
the current window, or navigating to a different document (in this
case, a cheesy banking site).

While everything about this exploit is extremely goofy, and I put no
effort into making the transitions less obvious, it should still
demonstrate the issue neatly.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] silly PoCs continue: X-Frame-Options give you less than expected

2011-12-10 Thread Michal Zalewski
 Interesting stuff indeed. However, I don't see you talk about a solution.
 Why is that?

Because it's bugtraq / full-disclosure, where people generally talk
about vulnerabilities...

I'm not sure I follow your drift about Firefox, I don't believe it's
mentioned anywhere.

 Anyhow, correct me if I'm wrong, but this concept won't work when the
 attacked site requires multiple user interaction, right? As in, the user
 will notice something amiss the second time.

Why?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-09 Thread Michal Zalewski
 They may be in the minority, but there *are* users out there who know how to
 look at the address bar. The security researcher knows this because he is
 one of them. I call this group the competent and contentious users.

Sure. And that group is sort of safe when faced with open redirectors,
mouseover tooltips, etc - well, modulo funny corner cases like this:

http://lcamtuf.coredump.cx/switch/

...or:

http://lcamtuf.coredump.cx/switch/index2.html

I have seen the most users don't understand X anyway as an argument
against fixing X in the browser several times before, and I think
that's wrong; but I'm not sure this is applicable here.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-08 Thread Michal Zalewski
 For example: did you know that if you click on a link from coredump.cx
 to microsoft.com and it opens in a new window, then a second or two
 later, that coredump.cx in the background can change the URL of the
 microsoft.com window, and point it to evil.com? Heck, coredump.cx can
 even wait until you navigate further down the microsoft.com website -
 and detect that event programmatically. That behavior is enshrined
 within the current design of the same-origin policy, and browser
 vendors seem hesitant to touch it.

Here's a tiny PoC:
http://lcamtuf.coredump.cx/switch/

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-08 Thread Michal Zalewski
 I run with no script. So the links showed on the initial pages and when 
 clicked.

Yes, well, congrats ;-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-08 Thread Michal Zalewski
 Granted, but I know that vulnerability research can take a huge chunk
 of time out of a person's life, and without getting in to monetary 
 philosophy,
 I feel that in our current system, a person should be compensated for their
 time if they've done something useful for society.

Is this an existential discussion now?:-)

As the world is structured today, you are not automatically entitled
to compensation because you are doing something that, in your opinion,
helps the world. That said, you can often find other people who share
your sentiment, and are willing to support your cause.

As it happens, Google has a vulnerability reward programs that rewards
the effort of external security researchers with rewards typically
ranging from $500 to $3133.7 per bug. There are contributors earning a
decent living off of this program alone. You may view it cynically,
but the reason for having it isn't to suppress non-compliant
disclosure, but just to make the Internet a safer place - and to
compensate people in function of the difficulty of finding a flaw, and
the utility of that finding. The problem resulted in a *huge* spike of
privately reported vulnerabilities that nobody would be even bothered
to try to find before, and hasn't really affected the number of public
disclosures much.

If you don't like it, let us know how to improve it. You also always
have the option of not researching vulnerabilities in these platforms;
going with the full-disclosure approach; or selling the flaws to a
willing third party.

/mz

PS. I'm speaking on my own behalf, and trying to be as open as
possible, so let's not make it overly political.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-07 Thread Michal Zalewski
 _Open_ URL redirectors are trivially prevented by any vaguely sentient
 web developer as URL redirectors have NO legitimate use from outside
 one's own site so should ALWAYS be implemented with Referer checking

There are decent solutions to lock down some classes of open
redirectors (and replace others with direct linking), but Referer
checking isn't one of them. It has several subtle problems that render
it largely useless in real-world apps.

There are also some classes of redirection / content proxying problems
that you can't quite eliminate until you give up on offering certain
functionality to users (e.g. page translation, cached document views,
embeddable iframe gadgets) - and that's actually an interesting
conceptual struggle.

 Apparently Google's web developers are so stubbornly unable to absorb
 this simple notion that it has become company policy that officially
 Google does not care about open redirectors:

   
 http://www.google.com/about/corporate/company/rewardprogram.html#url-redirection

I actually wrote that bit, and as far as I remember, it's not a
half-assed attempt to justify incompetence ;-)

We have a vulnerability reward program, and it's just about not paying
$500 for reports of that vulnerability - along with not paying for
many other minimal-risk problems such as path disclosure.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-07 Thread Michal Zalewski
 As for minimal risk I personally don't agree. I have leveraged Unvalidated
 URL Redirections in the past to attack clients of sites all the time. It's
 highly trivial to point to a site with a metasploit browser bug patiently
 waiting and amass quite a large number of sessions in a short period of time
 should your spam campaign be efficient and actually draw users to the
 vulnerable site.

The problem is that the current contents of the address bar are about
the only security indicator you have in the browser. It's unfortunate,
and many users don't truly grasp this; and even if they do, they don't
understand the intricacies of the URL syntax - but still, that's what
we have to live with. The security community should try to fix this
huge problem - but the progress on this and many other fundamental
challenges in browser security is often hindered by the dynamics of
vendor-researcher interactions.

For time being, if you make security decisions based on onmouseover
tooltips, link text, or anything along these lines, and do not examine
the address bar of the site you are ultimately interacting with, there
is very little any particular web application can do to save you: you
are just at a significant risk wherever you go. If you take away open
redirectors, a myriad of other, comparable ways to fool you remain,
and can't be fixed easily.

For example: did you know that if you click on a link from coredump.cx
to microsoft.com and it opens in a new window, then a second or two
later, that coredump.cx in the background can change the URL of the
microsoft.com window, and point it to evil.com? Heck, coredump.cx can
even wait until you navigate further down the microsoft.com website -
and detect that event programmatically. That behavior is enshrined
within the current design of the same-origin policy, and browser
vendors seem hesitant to touch it.

I posted a brief rant about it about two years ago:

http://lcamtuf.blogspot.com/2010/04/address-bar-and-sea-of-darkness.html

I've been in the community for a while, and I hope it goes without
saying that I'm not here to be a mouthpiece for my current employer; I
just genuinely think it's a complicated problem, and we need to pick
our battles carefully. Redirectors are not particularly desirable, but
the big picture is less obvious than it seems.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] fast and somewhat reliable cache timing

2011-12-04 Thread Michal Zalewski
 http://lcamtuf.coredump.cx/cachetime/

OK, just for the record: I improved the original PoC quite a bit, and
added experimental variants for other browsers. I will shut up now.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] fast and somewhat reliable cache timing

2011-12-02 Thread Michal Zalewski
Evening,

This party trick is not particularly exciting, but hopefully
highlights a vaguely interesting point:

http://lcamtuf.coredump.cx/cachetime/

In essence, in the past few years, browser vendors have severely
crippled CSS :visited selectors in order to prevent CSS-based history
snooping that made the headlines not long ago (see, for example,
http://wtikay.com).  Although it's fairly obvious that other privacy
side channels, such as cache timing, theoretically disclose comparable
data, the attacks demonstrated so far offered, at best, vaguely
probabilistic results (say,
http://www.cs.princeton.edu/sip/pub/webtiming.pdf). On top of that,
cache probing was considered destructive, which significantly limited
its usability.

Consequently, an argument was made that CSS :visited offered unique
performance and reliability benefits and needed to be addressed
separately, while no serious work takes place on the remaining
vectors.

My PoC exploits cache timing in Firefox in what appears to be a fairly
fast and reliable way. It is a crude hack, so it will probably fail
for some of you - but it's probably still interesting. The key point
is that to probe for cached content without immediately polluting the
cache, we abort navigation before the HTTP request is made. We also
work around setTimeout / setInterval clamps by leveraging event
delivery.

PS. If this is even remotely interesting, you may also enjoy
http://lcamtuf.coredump.cx/tangled/

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FreeBSD ftpd and ProFTPd on FreeBSD remote r00t exploit

2011-12-01 Thread Michal Zalewski
 If you want to respect the license of this code you cannot include the
 exploit in your software.

And don't get me started about my patent on NOP sleds!

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Windows vulnerability in TCP/IP Could Allow Remote Code Execution (2588516)

2011-11-11 Thread Michal Zalewski
 next time, i wont say shit, and, believe it.

Well it's just that the attack you are describing will be thwarted by
setting a sticky bit on /tmp, and you have not demonstrated otherwise.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Symlink vulnerabilities

2011-10-25 Thread Michal Zalewski
 You can make it bypass Aslr ?

No, you are absolutely correct, this vulnerability can't be used to
bypass ASLR. Score one for address space randomization.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Symlink vulnerabilities

2011-10-25 Thread Michal Zalewski
 I think someone fed bugtraq archives into scigen.

I thought we're doing Twilight fanfic instead?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Symlink vulnerabilities

2011-10-22 Thread Michal Zalewski
 Actually, no; per user /tmp could only be accomplished, without a major 
 redesign and without breaking almost every application

[citation needed] ;-)

Only a fraction of apps uses /tmp... vendors can fix their own
distros: grepping for /tmp isn't complicated, and almost every
package usually ships with a handful of vendor-specific diffs anyway.

You will break some third-party stuff people download from the
Internet, but that's a self-correcting problem, and not exactly a
horrible prospect: Linux distros break crappy software with almost
every major release anyway, often due to far more fundamental changes
(e.g. different /dev or /proc semantics, or moving libraries and
includes around).

The namespace / pseudo-fs approach is fairly ancient and works, but
it's sort of ugly: it makes the filesystem behave counterintuitively
in the rare case somebody actually has a legit use for /tmp. Not a big
deal, but seems like an overcomplicated solution IMO.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Symlink vulnerabilities

2011-10-21 Thread Michal Zalewski
 In any case, the *right* answer isn't to play whack-a-mole fixing /tmp races,
 what you should be doing is using pam_namespace or similar so each user gets
 their own /tmp namespace.

That would result in counterintuitive behavior, I suppose... /tmp is a
fairly stupid and largely unnecessary artifact of the old.

If you are in charge of a distro, it would not hurt to nuke it
altogether and change all packages in your control to use per-user
$TMPDIR. Some third-party stuff will break - but it breaks every now
and then anyway.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Some hash values

2011-10-09 Thread Michal Zalewski
 I believe that this is the best place to post the following hash values:
 MD5Sum:a762a3b9cbfb3d63034646087680b254
 SHA1sum:6f25d72bd693b52de25c36d04f9e17f945420580
 SHA256sum:d5886dd14f3eac029d771da6bcc6d49bc2e50c79159e5390c9c0776c725243a5

No, for these specific hash values, I believe the appropriate place to
post them would be deviantArt.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-24 Thread Michal Zalewski
 Good catch, but you didn't provide for a working exploit at the time.

 Now I only see your name on the press. Why?

I don't know why this is in the news at all, let alone with any
specific attribution. Perhaps you wanted to ask the journalists?;-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-24 Thread Michal Zalewski
 just for the record I have the impression that this not the same vulnerability
 you outlined in your advisory a while back. It is more that the idea
 for this vulnerability originated from your advisory, not the same bug.

I don't think this even matters, and I really don't disagree...

In 2007, I noticed that their Range handling is silly, and may prompt
them to generate very large responses.

I casually proposed a window scaling-based attack back then, and
nothing happened.

My understanding is that your exploit is based on the same principle
(I don't think they fixed this in any way), but combines it with
protocol-level compression to force the server to waste some memory
and CPU resources to compress the response beforehand.

But in any case, life goes on, it's just a DoS. Good that they're fixing it...

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-23 Thread Michal Zalewski
 http://www.gossamer-threads.com/lists/apache/dev/401638

FWIW, I pointed out the DoS-iness of their Range handling a while ago:
http://seclists.org/bugtraq/2007/Jan/83

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] URL Spoofing vulnerability in different browsers

2011-07-22 Thread Michal Zalewski
 Just ignore Mustlive. The rest of the list does.

Well, sadly, it leads to things like this:

http://www.securityfocus.com/bid/40487

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-06 Thread Michal Zalewski
[ But for what it's worth, I am willing to bet that the script was
added without analyzing these subtle considerations, and that makes it
somewhat scary on its own accord. ]

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-06 Thread Michal Zalewski
 Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
 script is run when the package installed, and anytime su executes the
 script.

 reseed(8) performs a unsecured HTTP request to random.org for its
 bits, despite random.org offering HTTPS services.

This resulted in a couple of discussions elsewhere, but as weird the
idea of retrieving a seed from the Internet is (over HTTPS or not),
this particular use is probably (unintentionally) harmless.

Writing to /dev/[u]random does not replace the existing entropy pool,
and merely mixes some new data in. Therefore, the script does not
reduce the quality of the kernel PRNG if you already have some entropy
collected, even if the returned payload is completely bogus. The only
effect it may have is improving entropy if you don't have any, or not
doing anything useful (if connection fails, or predictable data is
returned).

I initially thought this is still bad news, because you don't want the
kernel to think it has more entropy than in reality (thus not blocking
/dev/random reads, etc) - but the write() performed by this code also
does not affect the entropy estimate by the virtue of not doing
RNDADDTOENTCNT or RNDADDENTROPY ioctls. So, it should be OK.

The use of HTTPS is a red herring (and establishing HTTPS without any
real entropy available is tricky anyway). A more significant concern
is that the ownership or quality of random.org may change. But in this
case, it simply renders this effort a nominally harmless no-op.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] (fractal-Self__) : A theoretical introduction to Universe, Conscious Machines and Programming Ur-cells !!!

2011-06-12 Thread Michal Zalewski
 Paradox are way of life... Hence, the goal here is to question every
 knowledge with reasoning and trying-not to build a static opinion on
 anything.

But have you tried contacting the vendor first?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Got an iPhone or 3G iPad? Apple is recording your moves

2011-04-21 Thread Michal Zalewski
 Cool. I got an Iphone 3GS. Consider me ex-user. GG Apple. Let me guess,
 co-operation deal with NSA and the U.S goverment paid them some billion
 dollars for that.

Totally. A vast conspiracy is the only possible explanation.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5.1 released

2011-04-12 Thread Michal Zalewski
 I would like to suggest that advertising for products and tools (free or
 otherwise) be limited to just an initial announcement to tell people about
 the tool.

Meh. Most authors keep the volume of their announcements low, and only
highlight genuinely interesting updates. I think it's beneficial to
allow this.

Maybe highlighting the importance of these two qualities is the way to go?

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Announcement posts and the charter (was Re: INSECT Pro 2.5.1 released)

2011-04-12 Thread Michal Zalewski
 It's whatever, un-moderated means exactly that. No-one can tell anyone else 
 what to release/write. Period.

Of course you can. That's what the charter is for. Unmoderated means
simply that the charter is usually not proactively enforced (but even
that is hardly an absolute guarantee).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] SSL Capable NetCat and more

2011-03-28 Thread Michal Zalewski
 This one is from command line, maybe the next will be in
 the server mode or whatever.

Man, I hope you never find out what Perl is written in...

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] III World War. - Broadcast Request.

2011-02-28 Thread Michal Zalewski
 I believe that the IIIWorld War conflict might start in 10 months or
 more from now.

It's hard to disagree.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-24 Thread Michal Zalewski
 this is only true for remote attackers hitting network service auth.
 Mhmm, and runas, su et al couldn't benefit from this?

Not a whole lot. You can likely tell a successful login from a failed
one within several miliseconds by watching /proc or so.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 I mean, if these are the security industry's geniuses, why, what would the
 writers of Stuxnet be?

...seriously?

 Disclosing how their epic story simply involved SQLi, well, what about the
 guys discovering 0days in native code?

Totally. I have long postulated that perl -e '{print Ax1000}' is
considerably more l33t than scriptalert(1)/script or ' OR '1' ==
'1.

I don't understand the point you are getting at. I think that the more
interesting aspect of this story are the egregious practices revealed
in that write-up (and elsewhere):

http://lcamtuf.blogspot.com/2011/02/world-of-hbgary.html

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 Also, I would say that even though randomly prodding exec arguments
 with As isn't so elite, the space of the non-web is much more deep
 and much more complex than the space of the web..

I think that sentiment made sense 8-10 years ago, but today, it's
increasingly difficult to defend. I mean, we are at a point where
casual users can do without any real applications, beyond just
having a browser. And in terms of complexity, the browser itself is
approaching the kernel, and is growing more rapidly.

Yes, web app vulnerabilities are easier to discover. That's partly
because of horrible design decisions back in the 1990s, and partly
because we're dealing with greater diversity, more complex
interactions, and a much younger codebase. Plus, we had much less time
to develop systemic defenses.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 If it did for Google, you're either mistaken, [...]

Huh, what? Where did that come from?

I would generally appreciate if we refrain from dragging it employers,
business contacts, etc, into what amounts to an exchange of personal
opinions.

 However, calling it an all out myth is misleading, and saying it's because 
 contractors are pushing a myth is just wrong.

My point is roughly this:
http://lcamtuf.blogspot.com/2011/02/give-me-give-me-p-give-me-t.html

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 You and Ormandy have a lot to learn, still.

Oh, hai.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 You can't be high profile Google employees one minute and switch off as
 personal entities the next, its pretty basic.

Thank you for pointing this out to me. Your concern has been noted.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What the f*** is going on?

2011-02-22 Thread Michal Zalewski
 all apologies, that was not my intent in the least-- referencing the public 
 portion of the aurora stuff, which is part of the myth I thought you were 
 referencing.

Sure. The moment the discussion strays toward these topics, I am
obviously not at liberty to discuss them freely.

In general, I simply think that framing the problems that the industry
is facing in terms of dealing with a new, sophisticated adversary is
kind of meaningless and destructive, even if the risk is fundamentally
true. The idea that AV + IDS + a prepackaged PCI / SOX / BS7799 audit
was a legitimate response to the threats faced 5-10 years ago is about
as misguided as the notion that $2M botnet monitoring or an IV drip of
0-day vulns will do the trick this time around.

(Even if you need offensive capabilities - and most parties don't -
nurturing a free market of 0-days sold to the highest bidder for
exorbitant fees does not seem like a particularly good long-term
plan.)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] www.google.com xss vulnerability Using mhtml

2011-01-28 Thread Michal Zalewski
FYI, here's a provisional advisory from Microsoft acknowledging this issue:
http://www.microsoft.com/technet/security/advisory/2501696.mspx

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] www.google.com xss vulnerability Using mhtml

2011-01-26 Thread Michal Zalewski
 I woudn't like to discourage ppl submitting vulns to vendors but this is the
 response you'll most likely to get from those kind of vendors no matter what
 you found in their system. I had more than a dozen similar experience like
 yours. Now it's public + fixed and you gotta get nothing beside these
 replies (:

I think you'd be surprised. Our reward panel consists solely of people
you would recognize from this list, BUGTRAQ, or vendor advisories; and
we are very consistent, timely, and pretty generous in rewarding a
large proportion of all incoming reports. Ask around :-)

In this particular case, though, the underlying problem is clearly a
browser-side flaw that is nearly impossible to fully address on web
application side - and one that first surfaced in 2004, then wasn't
fully fixed in 2007:

http://openmya.hacker.jp/hasegawa/security/ms07-034.txt

Even in cases like this, we sometimes reward the reporter when we are
given advance notice, and there are clear ways we can protect our
users. But in this instance, the report is already public, we are
already aware it, and we are trying to deploy basic workarounds in a
number of exposed spots; and as noted, realistically, there is a
limited recourse any web app provider will have.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] www.google.com xss vulnerability Using mhtml

2011-01-26 Thread Michal Zalewski
 1.www.google.com app don't filter the CRLF

This is not strictly required; there are other scenarios where this
vulnerability is exploitable.

 2.IE support mhtml protocol handler to render the mhtml file format,
 and this is the why mhtml: is designed

The real problem is that when mhtml: is used to fetch the container
over an underlying protocol, it does not honor Content-Type and
related headers (or even nosniff).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Announcing cross_fuzz, a potential 0-day in circulation, and more

2011-01-01 Thread Michal Zalewski
Hi list,

== SUMMARY ==

I am happy to announce the availability of cross_fuzz - an amazingly
effective but notoriously annoying cross-document DOM binding fuzzer that
helped identify about one hundred bugs in all browsers on the market - many
of said bugs exploitable - and is still finding more.

The fuzzer owes some of its efficiency to dynamically generating extremely
long-winding sequences of DOM operations across multiple documents,
inspecting returned objects, recursing into them, and creating circular node
references that stress-test garbage collection algorithms. More info about
the exact algorithm used is given here:

http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html

The design of the fuzzer makes it unexpectedly difficult to get clean,
deterministic repros; to that effect, in the current versions of all the
affected browsers, we are still seeing a collection of elusive problems when
running the tool - and some not-so-elusive ones. I believe that at this
point, a broader community involvement may be instrumental to tracking down
and resolving these bugs.

*** I also believe that at least one of the vulnerabilities discovered by
cross_fuzz may be known to third parties - which makes getting this tool
out a priority. ***

== VENDOR RESPONSE / STATUS ==

* Internet Explorer: MSRC notified in July 2010. Fuzzer observed to trigger
  several exploitable crashes - e.g.:

  http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt

  ...ad well as some security-relevant GDI corruption issues.

  *** Reproducible, exploitable faults still present in current versions of
  the browser. I have reasons to believe that one of these vulnerabilities
  is known to third parties: http://goo.gl/7tcWh ***

  Comment: Vendor has acknowledged receiving the report in July (case
  10205jr), but has not contacted me again until my final ping in December.
  Following that contact attempt, they were able to quickly reproduce
  multiple exploitable crashes, and asked for the release of this tool to be
  postponed indefinitely. Since they have not provided an explanation as
  to why these issues could not be investigated earlier, I refused;
  more info here:

  http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt

* All WebKit browsers: WebKit project notified in July 2010. About two dozen
  crashes identified and addressed in bug 42959 and related efforts by
  several volunteers. Relevant patches generally released with attribution
  in security bulletins. Some extremely hard-to-debug memory corruption
  problems still occurring on trunk.

* Firefox: Mozilla notified in July 2010. Around 10 crashes addressed in bug
  581539, with attribution in security bulletins where appropriate. Fuzzing
  approach subsequently rolled into Jesse Ruderman's fuzzing infrastructure
  under bug 594645 in September; from that point on, about fifty additional
  bugs identified (generally with no specific attribution at patch time).
  Several tricky crashes still occurring on trunk.

  Note: Flash-related (npswf32.dll) bad read/write offset crashes are also
  common if the plugin is installed.

* Opera: vendor notified in July 2010. Update provided in December stated
  that Opera 11 fixes all the frequent crashes, and that a proper security
  advisory will be released at a later date. Release notes state: Fixed a
  high severity issue; details will be disclosed at a later date. Several
  hard-to-debug crashes reportedly still waiting to be resolved.

  Note that with Opera, the fuzzer needs to be restarted frequently due
  to OOM conditions.

== DEMO / DOWNLOAD URL ==

Please see:
http://lcamtuf.coredump.cx/cross_fuzz/

== MISC NOTES ==

Cross_fuzz can be easily extended to fuzz any DOM-enabled documents
or browser plugins simply by providing new target documents. This may
be an interesting area for future research.

I believe that releasing the tool at this point is considerably more prudent
than the approach taken with ref_fuzz in 2008-2010:

  http://lcamtuf.blogspot.com/2010/06/announcing-reffuzz-2yo-fuzzer.html

For updates, you can actually follow me on Twitter (gasp):

  http://twitter.com/lcamtuf

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Default SSL Keys in Multiple Routers

2010-12-20 Thread Michal Zalewski
 These manufacturers use the same key on each of their models?  That seems
 ridiculous to me...

As a person who had a Siemens AP / router with a hardcoded, hidden
management account on it, I find your surprise entertaining ;-)

Craig, cool project.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Michal Zalewski
 So for 10 years IPSEC has had a backdoor in it and not one person examining
 the code has noticed it?  Or even questioned it?  That's a bit hard to
 believe.

Yeah, this totally never happens in the FOSS world.

http://www.theregister.co.uk/2009/08/14/critical_linux_bug/

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] OpenBSD Paradox

2010-12-15 Thread Michal Zalewski
 sci.crypt would probably be the best place to ask. I imagine there's a
 discussion already, but have not visited lately.

Have you been to the Usenet recently?;-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] minor browser UI nitpicking

2010-12-14 Thread Michal Zalewski
Hi folks,

Two minor things that do not deserve a lengthy discussion, but are
probably mildly interesting and worth mentioning for the record:

1) Chrome browser is an interesting example of the perils of using
minimalistic window chrome, allowing multiple windows to be spliced
seamlessly to confuse the user as to the origin of the displayed
content. An unconvincing Windows-specific proof-of-concept:
http://lcamtuf.coredump.cx/chsplice/

2) I reported this to the vendor long time ago, and could not get them
to commit to a specific fix: Safari allows windows without the address
bar and other essential chrome, akin to the behavior of other browsers
circa 10 years ago. This essentially makes all other address spoofing
vulnerabilities redundant, as the attacker has the ability to decorate
windows arbitrarily (you can look up ancient proof-of-concept exploits
for Netscape or MSIE here).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] minor browser UI nitpicking

2010-12-14 Thread Michal Zalewski
 1) Yup, pretty unconvincing. Though one could separate window shadows,

I'm guessing you have your window manager configured to render window
shadows. In this case, this is less plausible, yup, unless you do the
inverted gradient trick.

 2) Where is here? :)

I tried to dig something up, but couldn't. But we definitely had these
around 2001-2003, culminating in browsers removing the ability to do
location=no in window.open().

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Firefox 3.6.13 pseudo-URL SOP check bug (CVE-2010-3774)

2010-12-09 Thread Michal Zalewski
Hi folks,

Firefox 3.6.13 fixes an interesting bug in their same-origin policy
logic for pseudo-URLs that do not have any inherent origin associated
with them. These documents are normally expected to inherit the
context from their parent, or be assigned a unique one. This didn't
work as expected in Firefox, apparently due to a code refactoring in
2008. The vulnerability permits malicious websites to access and
modify the contents of special pages such as about:neterror or
about:config, which has consequences ranging from content spoofing to
complete subversion of the browser security model.

More info: 
http://lcamtuf.blogspot.com/2010/12/firefox-3613-damn-you-corner-cases.html
Whimsical PoC: http://lcamtuf.coredump.cx/ffabout/

PS. I posted a couple of probably interesting browser security
write-ups on my blog of recent, recapping the status quo in areas such
as HTTP cookie security. Some readers might find them interesting /
useful - say: 
http://lcamtuf.blogspot.com/2010/10/http-cookies-or-how-not-to-design.html

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Source Code Vulnerability Scanner (Free 30 Day Trial)

2010-12-03 Thread Michal Zalewski
 grep -r ACIDBITCHES *

This code has two very obvious detection bypass vulnerabilities:

1) It fails to scan dotfiles in the starting directory,

2) It can be tricked into not producing any output by creating a file
named -q in the starting dir.

Let me fire up my vulnerability research whitepaper generator.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Open Letter to Lee Vartan, Assistant United States Attorney in regards to the Goatse Security iPad case.

2010-11-19 Thread Michal

Are we done?? The pair of you?? Yes??

Good, move on

On 18/11/10 11:19, huj huj huj wrote:

the pot calling the kettle black?
lol you are becoming increasingly delusional
maybe you should go back to eating out hepkitten
its no wonder your parents gave up on you..

2010/11/18 Andrew Auernheimer glutt...@gmail.com 
mailto:glutt...@gmail.com


You're getting really incoherent. Do you need some ESL classes?
Perhaps you should contact one of those commercial services that write
college papers for lazy students to draft your FD troll posts.

On Thu, Nov 18, 2010 at 5:12 AM, huj huj huj datski...@gmail.com
mailto:datski...@gmail.com wrote:
 i didnt get the info from hepkitten? i dont see where you got
that fact from
 what i said was that hepkitten ousted you from bantown
 maybe if you learned how to read your life would be easier..
 white hat security researcher my ass
 is phishing myspace and livejournal accounts through lame memes
whitehat? i
 doubt it..
 get a grip and pull that dildo out of your ass you retard

 2010/11/18 Andrew Auernheimer glutt...@gmail.com
mailto:glutt...@gmail.com

 I have never denied the extensive production of politically
motivated
 art I have produced, including the iProphet. I will continue making
 such compelling art to evoke emotion in my audiences.

 Regardless, the empirical evidence points to me being:

 * An anti-organized crime and anti-child pornography activist, a
 practice which I have been engaging in for years upon years. I have
 extensive evidence of merit to back this up and can say it under
 penalty of perjury.
 * A consumer rights advocate and white hat security researcher,
 something I have been cited by other respected researchers and won
 awards for public service for:



http://techcrunch.com/2010/06/14/were-awarding-goatse-security-a-crunchie-award-for-public-service/

 and your idea of a reliable source of information is... hepkitten?
 Clearly the only joke here is you, buddy.

 On Thu, Nov 18, 2010 at 4:03 AM, huj huj huj
datski...@gmail.com mailto:datski...@gmail.com wrote:
  of course you didn't... and you also don't have a beard and
post lame
  rants
  as the iprophet :)
  as for me eating fecal matter, you're just envious
 
  you are not fighting anything other than your anonymity and
empty wallet
 
  stop pretending otherwise nobody believes your silly little
lies and
  misconceptions anyway
 
  you and the rest of your losercrew can go suck a lemon
 
  you were never anything.. hell hepkitten ousted you lol
 
  loser
 
 
  2010/11/18 Andrew Auernheimer glutt...@gmail.com
mailto:glutt...@gmail.com
 
  I never made those statements. They seem particularly
ridiculous and
  not even remotely in my rhetorical style. But for the sake of
  argument, I have IRC logs showing that you're a degenerate
shit eater:
 
  01:42  Hujhujhuj last night I got a train run on me in a
sling at a
  pozzing party
  01:42  Hujhujhuj i loved having an ass packed full of semen
  01:42  Hujhujhuj after it was done 4 hairy bears shit on
my chest
  01:44  Hujhujhuj i packed the delicious feces into my
mouth and i
  loved every single scrumptious bite
  01:46  Hujhujhuj im going to get tested later today, i
hope its poz,
  ive been trying for ages
 
  What do you have to say for yourself?
 
  On Thu, Nov 18, 2010 at 3:42 AM, huj huj huj
datski...@gmail.com mailto:datski...@gmail.com
  wrote:
   ah sorry it was 8k owned macs you wanted to sell to the
russians..
   how very patriotic of you!!
   cunt :)
  
   09:50 weev i gotta get some money
   09:50 weev my cashflow sucks
   09:51 weev whores
   09:51 weev lavish cars
   09:51 weev gigantic places to live
  
   15:05 weev does anybody know these russians
   15:06 weev that they are buying up hacked macs for 43
cents an
   install
   15:26 weev i have access to like
   15:26 weev 8k rooted macs
   15:26 weev right now
   15:26 weev and i would like to make a quick $3500
  
  
   2010/11/18 huj huj huj datski...@gmail.com
mailto:datski...@gmail.com
  
   yeah takes one to know one
   you have always been a nobody chasing fame with silly
memes and
   smalltime
   trolling
   you keep talking about what others have done
   well i save starving children in africa
   i singlehandedly removed all german pedophiles from
pattaya in 2009
   i stopped the cold war between usa and cccp
   i could go on but i already copied your silly lies too much
   let me recap
   you have done absolutely nothing to help anyone but yourself
   you are a greedy 

[Full-disclosure] some ooold Juniper bugs (was: ZDI-10-231: Juniper Secure Access Series meeting_testjava.cgi XSS Vulnerability)

2010-11-07 Thread Michal Zalewski
This reminded me of a bunch of problems I spotted in Juniper SSL VPN a
while ago; they are apparently fixed, but I don't recall seeing any
public vendor advisory / credit for reporting them - so here you go,
even if just for the record...

These were fixed by Juniper in IVE 6.3R1, 6.2R3, 6.1R5, 6.0R8, and 5.5
R7.1 over a year ago.

1) Auth bypass - IVE permitted just about any script on the box to be
invoked without authentication by going through a
/dana-na/download/?url= hop, for example:

https://IVE/dana-na/download/?url=/dana/home/launch.cgi?url=http://www.example.com/

2) XSS flaws (which are pretty bad in SSL VPN appliances, because they
completely trash the security model of this access mode):

This worked in IVE 6.2:
https://IVE/dana-na/meeting/meeting_testresult.cgi?redir=%2Fdana-na%2Fmeeting%2Flogin_meeting.cgi%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Ejava=1

This worked with IVE 5.5  Firefox:
https://IVE/dana-na/download/?url=/dana/home/launch.cgi?url=data:text/html%3bbase64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ%2b

This worked with IVE 5.5  MSIE:
https://IVE/dana-na/download/?url=/dana/home/launch.cgi?url=vbscript:MsgBox(%2522Hi%2522)

XSS + response splitting:

/dana-na/download/?url=/dana/fb/smb/wfmd.cgi?file=AAA%0aRefresh:%201,URL=javascript:alert(1)%0aFoo:%0a%0a

And some more vanilla XSSes:

/dana/fb/smb/rd.cgi?si=%22)%3balert(1)%3b/script

/dana/fb/smb/wu.cgi?dir=foo%22scriptalert(1)%3b/script

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] some ooold Juniper bugs (was: ZDI-10-231: Juniper Secure Access Series meeting_testjava.cgi XSS Vulnerability)

2010-11-07 Thread Michal Zalewski
 And the political spin: companies get away with shipping broken
 software and residing in (1) and (2) above because there are no
 software liability laws, even though software enjoys intellectual
 property protection. Reason: In America, corporate America bribes the
 legislature (err, makes 'PAC contributions').

Good thing we have excellent software liability laws in the EU, then ;-)

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  1   2   3   >