Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-12 Thread Bob Toxen
Wachovia Bank's Web Security people did phone me late yesterday to thank
me for raising the security issue.  They also stated that they were
investigating why my initial contacts with Wachovia did not result in
an appropriate response.

They said that they also were working with their legal people to determine
what notification to consumers, if any, was required due to the California
data breach law and similar laws elsewhere.

It was not made clear whether their phone call (and their correction
of the web page) was directly due to my posting on the Full-disclosure
list or because Steve Ragan saw my posting and contacted Wachovia.


For those who questioned whether I made sufficient attempts to contact
them, please note that I talked by phone both with customer support and
web support people and then FAXed the details to the web support person
who took my call.  Note that I bothered with this at all as a courtesy
to Wachovia.  Nobody paid me for my time.

For those who questioned whether I gave them sufficient time to react,
I stated in my FAX to them, in effect, that all they had to do within
7 days was to respond to the FAX and ask for more time to deal with
the problem.  I then waited 15 days, not 7, before posting on FD after
having received no response and seeing that the problem remained.

For those who questioned my motives and suggested that I deliberately
did not make sufficient effort to contact them, well, I detailed my
3 contacts above and then got no response for 15 days.  For those who
suggested I was motivated by fame, well, I already have that.  I won't
blow my horn here but anyone is welcome to do a Google search on me.

Wachovia has fixed the problem.  They are working to ensure that future
advisories are handled properly.  Thanks to all who responded.  Shall we
put this matter to bed?

Bob Toxen,
Horizon Network Security
http://www.verysecurelinux.com   [Network & Linux/Unix Security Consulting]
http://www.realworldlinuxsecurity.com [Our 5* book: "Real World Linux Security"]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Peter Dawson

Reconfirming time stamp(s)



their policy pages was updated






On 7/11/07, Bob Toxen <[EMAIL PROTECTED]> wrote:


On Wed, Jul 11, 2007 at 12:38:54PM -0400, Steve Ragan wrote:
It has comments with time-stamps of late yesterday, after I disclosed
on the list:

 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Toxen
On Wed, Jul 11, 2007 at 12:38:54PM -0400, Steve Ragan wrote:
> The link now redirects to an HTTPS page
Thanks Steve.

This proves the value of Full Disclosure.

This seems to have changed within a few hours of my posting to Full
Disclosure rather than in the several weeks after I first alerted it.
Note that Wachovia still has not subsequently contacted me to thank me,
acknowledge my work, or to threaten me.

Yes, the page that consumers can get to by navigating Wachovia's web site
(or in response to the paper mail Wachovia sent out) now is the
following, which posts using https to provide strong encryption:

  https://www.wachovia.com/personal/forms/privacy_optout

It has comments with time-stamps of late yesterday, after I disclosed
on the list:

 


I do note that the existing URL:

 http://www.wachovia.com/personal/forms/privacy_optout

still exists and is accessible.

That http page still appears to post the SSN, etc. unencrypted.
Clearly, someone needs to delete the old page or only allow it as https.
Of course, this is a very minor issue as there is no way for a consumer
"trip over" this page accidentally.

I wonder if Wachovia will follow the California state breach security
policy.


Bob


> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Bob Toxen
> Sent: Tuesday, July 10, 2007 8:20 PM
> To: full-disclosure@lists.grok.org.uk
> Subject: [Full-disclosure] Wachovia Bank website sends confidential
> information
> 
> Wachovia Bank website sends confidential information (social security
> numbers, phone number, address, etc.) over the Internet without encryption.
> 
> Horizon Network Security Security Advisory 07/10/2007
> http://VerySecureLinux.com/ Jul 10, 2007
> 
> I. BACKGROUND
> 
> Wachovia Bank's official web site offers the following URL to allow its
> customers to change their privacy preferences:
> 
>  http://www.wachovia.com/privacy
> 
> Wachovia also notified its customers by U.S. Mail that they can use that
> same URL besides.
> 
> That URL has a link to the following to actually change one's
> preferences:
> 
>  http://www.wachovia.com/personal/forms/privacy_optout
> 
> Unfortunately, that page appears to be an ordinary HTML form whose "filled
> out data" then is transmitted via the "post" method to an http (not https)
> URL.
> 
> III. ANALYSIS
> 
> We inspected the page's source via our Opera browser.  (We did not sniff the
> web traffic so we are not absolutely sure that there is not some hidden
> encryption method, though there appears to be none.)
> 
> IV. DETECTION
> 
> It is trivial to inspect the page source or sniff the data to demonstrate
> the problem.  The problem has not been corrected.
> 
> V. WORKAROUND
> 
> Use a method other than their web site to exercise one's preferences.
> 
> VI. VENDOR RESPONSE
> 
> The vendor (Wachovia Bank) was notified via their customer service phone
> number on June 25.  We were transferred to "web support".  The person
> answering asked us to FAX the details to her and we did so, also on June 25.
> We explained that we were reporting a severe security problem on their web
> site.
> 
> We stated that that if we did not hear back from them within 7 days and the
> problem was not fixed by then that we would post the problem on the Full
> Disclosure list, following accepted industry practice.
> 
> To date we have received no response and the problem remains unfixed.
> 
> VII. CVE INFORMATION
> 
> There is no CVE number.
> 
> VIII. DISCLOSURE TIMELINE
> 
> 06/25/2007  Initial vendor notification
> 06/25/2007  Vendor requested FAXed details
> 06/25/2007  Details FAXed to vendor
> 
> 07/20/2007  No vendor response
> 07/20/2007  Public disclosure on this Full Disclosure list
> 
> IX. CREDIT
> 
> This problem was discovered by Bob Toxen, one of our engineers.
> 
> X. LEGAL NOTICES
> 
> Copyright C 2007 Horizon Network Security.  All rights reserved.
> 
> Permission is granted for the redistribution of this alert electronically.
> It may not be edited without the express written consent of Horizon Network
> Security.  If you wish to reprint the whole or any part of this alert in any
> other medium other than electronically, please e-mail
> [EMAIL PROTECTED] for permission.
> 
> Disclaimer: The information in the advisory is believed to be accurate at
> the time of publishing, based on currently available information.  Use of
> the information constitutes acceptance for use in an AS IS condition and
> waiving of the right to any action against Horizon Network Security or its
> employees or contractors.
> 
> There are no warranties with regard to this information.  Neither the author
> nor the publisher accepts any liability for any direct, indirect, or
> consequential loss or damage arising from use of, or reliance on, this
> information.
> 
> We believe Wachovia Bank is obligated by California's security breach
> disclosure laws to notify its California customers who may have used this
> form

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Steve Ragan
The link now redirects to an HTTPS page
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bob Toxen
Sent: Tuesday, July 10, 2007 8:20 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Wachovia Bank website sends confidential
information

Wachovia Bank website sends confidential information (social security
numbers, phone number, address, etc.) over the Internet without encryption.

Horizon Network Security Security Advisory 07/10/2007
http://VerySecureLinux.com/ Jul 10, 2007

I. BACKGROUND

Wachovia Bank's official web site offers the following URL to allow its
customers to change their privacy preferences:

 http://www.wachovia.com/privacy

Wachovia also notified its customers by U.S. Mail that they can use that
same URL besides.

That URL has a link to the following to actually change one's
preferences:

 http://www.wachovia.com/personal/forms/privacy_optout

Unfortunately, that page appears to be an ordinary HTML form whose "filled
out data" then is transmitted via the "post" method to an http (not https)
URL.

III. ANALYSIS

We inspected the page's source via our Opera browser.  (We did not sniff the
web traffic so we are not absolutely sure that there is not some hidden
encryption method, though there appears to be none.)

IV. DETECTION

It is trivial to inspect the page source or sniff the data to demonstrate
the problem.  The problem has not been corrected.

V. WORKAROUND

Use a method other than their web site to exercise one's preferences.

VI. VENDOR RESPONSE

The vendor (Wachovia Bank) was notified via their customer service phone
number on June 25.  We were transferred to "web support".  The person
answering asked us to FAX the details to her and we did so, also on June 25.
We explained that we were reporting a severe security problem on their web
site.

We stated that that if we did not hear back from them within 7 days and the
problem was not fixed by then that we would post the problem on the Full
Disclosure list, following accepted industry practice.

To date we have received no response and the problem remains unfixed.

VII. CVE INFORMATION

There is no CVE number.

VIII. DISCLOSURE TIMELINE

06/25/2007  Initial vendor notification
06/25/2007  Vendor requested FAXed details
06/25/2007  Details FAXed to vendor

07/20/2007  No vendor response
07/20/2007  Public disclosure on this Full Disclosure list

IX. CREDIT

This problem was discovered by Bob Toxen, one of our engineers.

X. LEGAL NOTICES

Copyright C 2007 Horizon Network Security.  All rights reserved.

Permission is granted for the redistribution of this alert electronically.
It may not be edited without the express written consent of Horizon Network
Security.  If you wish to reprint the whole or any part of this alert in any
other medium other than electronically, please e-mail
[EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate at
the time of publishing, based on currently available information.  Use of
the information constitutes acceptance for use in an AS IS condition and
waiving of the right to any action against Horizon Network Security or its
employees or contractors.

There are no warranties with regard to this information.  Neither the author
nor the publisher accepts any liability for any direct, indirect, or
consequential loss or damage arising from use of, or reliance on, this
information.

We believe Wachovia Bank is obligated by California's security breach
disclosure laws to notify its California customers who may have used this
form and the State of California.  Other jurisdictions also may have
notification requirements.

Bob Toxen,
Horizon Network Security
http://www.verysecurelinux.com   [Network & Linux/Unix Security
Consulting]
http://www.realworldlinuxsecurity.com [Our 5* book: "Real World Linux
Security"]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


--
No virus found in this incoming message.
Checked by AVG Free Edition. 
Version: 7.5.476 / Virus Database: 269.10.2/893 - Release Date: 7/9/2007
5:22 PM


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Bruen
Hi Jim,

No, I did not "declare the whole of Wachovia technically challenged based 
on the one incident at a security conference.." What I was pointing out is 
that the current problem of their failure to put up a secure web and their 
failure to respond to notification about has another data point from 6 
about months ago.

In general enterprises send only a small group of people to any given 
conference, so no, the whole of Wachovia did not attend. Nevertheless, 
when you are the one attending, you are a representive of that enterprise.

You seemed to have missed the point that I was adding to a discussion, not 
trying to create a new one. My point was in the dustbin, where it would 
have stayed, until the current discussion appeared.

 -- bob

On Wed, 11 Jul 2007, Jim Popovitch wrote:

> On Wed, 2007-07-11 at 12:03 -0400, Bob Bruen wrote:
>> While it is true that lots of folk pick on vendors for a few minutes of
>> fame, the Wachovia case is slightly different.
>>
>> They do have an attitude problem and are technically challenged. The basis
>> for this is a law enforcement conference about six months ago. During a
>> pressentation a Wachovia representative told a speaker to stop blaming the
>> banks for problems. This was the third presentation this individual has
>> listened to in which each speaker had blamed the banks for not doing
>> enough and the frustration level was a bit high.
>
> So you declare the whole of Wachovia technically challenged based on the
> one incident at a security conference (did all of Wachovia attend?) six
> months ago?  Come on. ;-)
>
> Wachovia, like every other large enterprise, has good, mediocre, and bad
> employees.  It's a fact of life, but not a news worthy story.  I'm sure
> that some days the best and brightest represent Wachovia at some
> conference somewhere, and I am equally sure that some days the worst and
> most deplorable represent Wachovia at some conference somewhere.  It
> happens.
>
> -Jim P.
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

-- 
Dr. Robert Bruen
Cold Rain Technologies
http://coldrain.net
+1.802.579.6288

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Jim Popovitch
On Wed, 2007-07-11 at 12:03 -0400, Bob Bruen wrote:
> While it is true that lots of folk pick on vendors for a few minutes of 
> fame, the Wachovia case is slightly different.
> 
> They do have an attitude problem and are technically challenged. The basis 
> for this is a law enforcement conference about six months ago. During a 
> pressentation a Wachovia representative told a speaker to stop blaming the 
> banks for problems. This was the third presentation this individual has 
> listened to in which each speaker had blamed the banks for not doing 
> enough and the frustration level was a bit high.

So you declare the whole of Wachovia technically challenged based on the
one incident at a security conference (did all of Wachovia attend?) six
months ago?  Come on. ;-)

Wachovia, like every other large enterprise, has good, mediocre, and bad
employees.  It's a fact of life, but not a news worthy story.  I'm sure
that some days the best and brightest represent Wachovia at some
conference somewhere, and I am equally sure that some days the worst and
most deplorable represent Wachovia at some conference somewhere.  It
happens.

-Jim P.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Security Guy
Or hey, if you're not getting anywhere with him, talk to this guy!
http://www.belkcollege.uncc.edu/jpfoley/



> Let me see:
> wachovia security cissp "incident" +network via Google
>
> This looks interesting:
> http://www.bryceporter.com/
>
> I would have contacted someone on this level to put me in
> touch with the right person. But hey, guess its more hip
> to add stupid little tags next to your resume or webpage:
> I broke $INSERT_VENDOR_HERE
>

--

Lasciate ogne speranza, voi ch'intrate

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

Bob Bruen wrote:
While it is true that lots of folk pick on vendors for a few minutes of 
fame, the Wachovia case is slightly different.


They do have an attitude problem and are technically challenged. The basis 
for this is a law enforcement conference about six months ago. During a 
pressentation a Wachovia representative told a speaker to stop blaming the 
banks for problems. This was the third presentation this individual has 
listened to in which each speaker had blamed the banks for not doing 
enough and the frustration level was a bit high.


This only comes up because of the current Wachovia web site issue. It 
shows that there is an internal problem, worse than most, endind with the 
current situation. And no I will not indentify any of the players.


   --bob
  


Mechanisms of politrix... I was doing contract work from home for a
HUGE-O-MONGOUS tech company I won't name (NDA) and was assigned to
do fw administration, configuration for a bank that outsource it to
this HUGE-O-MONGOUS monster. When we needed to implement a change
these were the steps:

"Uh oh.. We're seeing attacks from network X" ...

1) Call manager
2) Manager calls his manager in another state
3) That manager calls sales rep
4) Sales rep called the bank's contact
5) Bank's contact called his security team
6) Hey security team, you need to speak with your contractors
7) Security team to bank's contact ok make a conference call
8) Bank's contact to the sales rep - ok make a conference call
9) bank sales rep to HUGE-O-MONGOUS' sales rep - ok make a conference call
10) manager to manager - hey we're going to do a conference call
11) No wait... My contractor is tied up... Can we re-schedule?

In essence, when we needed to do things, it wasn't as cut and
dry as I thought it would be. In fact it was downright frustrating.
Here you are Rainwall open, NSM open about to fire off changes
but have to wait for at minimum 4 business days hoping no one
up the food chain was unavailable to make a mission critical
change.

Long story short, while at HUGE-O-MONGOUS I was surprised I
was even given the opportunity to be there - but hey contractors
liabilities, etc., legal foobarfoo wording exculpated HUGE-O-MONGOUS
company from the whole shmoo (compsec historians know the HIStory),
anyhow, I got frustrated working for them. I felt as if it was
such a dead end. Mind you I was making about $80.00 per hour
to roll out of bed and do work pretty much whenever I wanted.

Sometimes, things aren't as clear cut as one may think they are.
To me the initial "Oh noes! Wachovia is evil" post was nothing
more than someone itching for their Andy Warhol 15 minutes. With
that said... Off to lunch...


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


"Wise men talk because they have something to say;
fools, because they have to say something." -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Bruen

While it is true that lots of folk pick on vendors for a few minutes of 
fame, the Wachovia case is slightly different.

They do have an attitude problem and are technically challenged. The basis 
for this is a law enforcement conference about six months ago. During a 
pressentation a Wachovia representative told a speaker to stop blaming the 
banks for problems. This was the third presentation this individual has 
listened to in which each speaker had blamed the banks for not doing 
enough and the frustration level was a bit high.

This only comes up because of the current Wachovia web site issue. It 
shows that there is an internal problem, worse than most, endind with the 
current situation. And no I will not indentify any of the players.

   --bob


On Wed, 11 Jul 2007, J. Oquendo wrote:

> [EMAIL PROTECTED] wrote:
>> On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:
>>
>> 
>>> 7 days?   "industry practice"?   Come on Bob I know you know that large
>>> corporations can't feed a cat in 7 days let alone make unscheduled
>>> website changes that fast.  Change control approvals alone would include
>>> 14 or more days in most enterprises.   Why the rush to "say so"?
>>> 
>> 
>> On the other hand, I think that they *could* manage at least a "Wow d00dz, 
>> we
>> really *do* have a hole there" reply and at least give a handwaving about
>> when they'd fix it.  Of course, actually *fixing* a design flaw that big
>> is going to take them *months*.
>> 
>
> Driver walks into a dealer and speaks to customer service:
>
> "These brake pads are extremely vulnerable to slipping during X
> conditions on a 90 degree slalom" says the driver. Puzzled and
> not knowing squat about slaloms, or the breaking system, the
> customer service rep send the driver to a mechanic.
>
> "These brake pads are extremely vulnerable to slipping during X
> conditions on a 90 degree slalom. Someone will die!" says the
> driver to the mechanic... Not being able to change the auto's
> design nor engineering, the mechanic is puzzled and offers to
> take the information although he is even more puzzled on who
> this should be directed to.
>
> Two days later driver rambles on news stations nationwide:
> "Their arrogance will get people killed. I warned them repeatedly"
> People moan and grumble, etc., recalls, fixes...
>
> This Wachovia thread is pointless. I see no mention or posting
> to perhaps any security list (and I'm on many both public and
> private) saying: "Hey is there anyone who can put me in touch
> with someone in the know at Wachovia" on any list. All I see
> is... "I called customer service". So what, if you're a security
> professional you will know damn well you're getting nowhere
> with them. "I spoke to their w3bm4ster". And? Either the poster
> is looking for attention or a complete and utter idiot. If his
> or her true intention was to provide a report of a security
> woe concerning said business or product, he or she could have
> easily jumped on any security mailing list and found the right
> connection instead of rambling on "the sky is falling..."
>
> Let me see:
> wachovia security cissp "incident" +network via Google
>
> This looks interesting:
> http://www.bryceporter.com/
>
> I would have contacted someone on this level to put me in
> touch with the right person. But hey, guess its more hip
> to add stupid little tags next to your resume or webpage:
> I broke $INSERT_VENDOR_HERE
>
>
>
>
>

-- 
Dr. Robert Bruen
Cold Rain Technologies
http://coldrain.net
+1.802.579.6288

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread kazaam
I got you right? The one doing just for fun researches is in duty to 
find the correct person and not the company, making big buisness, in 
providing easy access to this person?

Yes you are obviously right ^^


J. Oquendo wrote:
> [EMAIL PROTECTED] wrote:
>> On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:
>>
>>  
>>> 7 days?   "industry practice"?   Come on Bob I know you know that large
>>> corporations can't feed a cat in 7 days let alone make unscheduled
>>> website changes that fast.  Change control approvals alone would 
>>> include
>>> 14 or more days in most enterprises.   Why the rush to "say so"?
>>> 
>>
>> On the other hand, I think that they *could* manage at least a "Wow 
>> d00dz, we
>> really *do* have a hole there" reply and at least give a handwaving 
>> about
>> when they'd fix it.  Of course, actually *fixing* a design flaw that big
>> is going to take them *months*.
>>   
>
> Driver walks into a dealer and speaks to customer service:
>
> "These brake pads are extremely vulnerable to slipping during X
> conditions on a 90 degree slalom" says the driver. Puzzled and
> not knowing squat about slaloms, or the breaking system, the
> customer service rep send the driver to a mechanic.
>
> "These brake pads are extremely vulnerable to slipping during X
> conditions on a 90 degree slalom. Someone will die!" says the
> driver to the mechanic... Not being able to change the auto's
> design nor engineering, the mechanic is puzzled and offers to
> take the information although he is even more puzzled on who
> this should be directed to.
>
> Two days later driver rambles on news stations nationwide:
> "Their arrogance will get people killed. I warned them repeatedly"
> People moan and grumble, etc., recalls, fixes...
>
> This Wachovia thread is pointless. I see no mention or posting
> to perhaps any security list (and I'm on many both public and
> private) saying: "Hey is there anyone who can put me in touch
> with someone in the know at Wachovia" on any list. All I see
> is... "I called customer service". So what, if you're a security
> professional you will know damn well you're getting nowhere
> with them. "I spoke to their w3bm4ster". And? Either the poster
> is looking for attention or a complete and utter idiot. If his
> or her true intention was to provide a report of a security
> woe concerning said business or product, he or she could have
> easily jumped on any security mailing list and found the right
> connection instead of rambling on "the sky is falling..."
>
> Let me see:
> wachovia security cissp "incident" +network via Google
>
> This looks interesting:
> http://www.bryceporter.com/
>
> I would have contacted someone on this level to put me in
> touch with the right person. But hey, guess its more hip
> to add stupid little tags next to your resume or webpage:
> I broke $INSERT_VENDOR_HERE
>
>
>
>
> 
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/


-- 
greets

one must still have chaos in oneself to be able to give 
birth to a dancing star

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

[EMAIL PROTECTED] wrote:

On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

  

7 days?   "industry practice"?   Come on Bob I know you know that large
corporations can't feed a cat in 7 days let alone make unscheduled
website changes that fast.  Change control approvals alone would include
14 or more days in most enterprises.   Why the rush to "say so"?



On the other hand, I think that they *could* manage at least a "Wow d00dz, we
really *do* have a hole there" reply and at least give a handwaving about
when they'd fix it.  Of course, actually *fixing* a design flaw that big
is going to take them *months*.
  


Driver walks into a dealer and speaks to customer service:

"These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom" says the driver. Puzzled and
not knowing squat about slaloms, or the breaking system, the
customer service rep send the driver to a mechanic.

"These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom. Someone will die!" says the
driver to the mechanic... Not being able to change the auto's
design nor engineering, the mechanic is puzzled and offers to
take the information although he is even more puzzled on who
this should be directed to.

Two days later driver rambles on news stations nationwide:
"Their arrogance will get people killed. I warned them repeatedly"
People moan and grumble, etc., recalls, fixes...

This Wachovia thread is pointless. I see no mention or posting
to perhaps any security list (and I'm on many both public and
private) saying: "Hey is there anyone who can put me in touch
with someone in the know at Wachovia" on any list. All I see
is... "I called customer service". So what, if you're a security
professional you will know damn well you're getting nowhere
with them. "I spoke to their w3bm4ster". And? Either the poster
is looking for attention or a complete and utter idiot. If his
or her true intention was to provide a report of a security
woe concerning said business or product, he or she could have
easily jumped on any security mailing list and found the right
connection instead of rambling on "the sky is falling..."

Let me see:
wachovia security cissp "incident" +network via Google

This looks interesting:
http://www.bryceporter.com/

I would have contacted someone on this level to put me in
touch with the right person. But hey, guess its more hip
to add stupid little tags next to your resume or webpage:
I broke $INSERT_VENDOR_HERE




--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


"Wise men talk because they have something to say;
fools, because they have to say something." -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Toxen
On Tue, Jul 10, 2007 at 09:39:33PM -0400, Jim Popovitch wrote:
> On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
> > VI. VENDOR RESPONSE

> > The vendor (Wachovia Bank) was notified via their customer service
> > phone number on June 25.  We were transferred to "web support".  The
> > person answering asked us to FAX the details to her and we did so,
> > also on June 25.  We explained that we were reporting a severe
> > security problem on their web site.

> Severe?  All that seems to be leaked is a person's Name/Address/SSN
> number and some other details.  While this is too much info to leak, I'd
> hardly say it's severe.   That same info can be easily found in people's
> mailboxes weekdays between noon and 4pm.
Leaking a SSN is considered serious.  My use of the term "severe" was
to get their attention.

> > We stated that that if we did not hear back from them within 7 days and
> > the problem was not fixed by then that we would post the problem on the
> > Full Disclosure list, following accepted industry practice.

> 7 days?   "industry practice"?   Come on Bob I know you know that large
> corporations can't feed a cat in 7 days let alone make unscheduled
> website changes that fast.  Change control approvals alone would include
> 14 or more days in most enterprises.   Why the rush to "say so"?
Please read my posting more carefully.  I stated that if I did not
hear back within 7 days and the problem persisted then I would disclose
it.  All they had to do was to ask for more time and I would have granted
any reasonable extension.  Instead, it appears that they ignored my
report; discouraging that is what Full Disclosure is all about, IMO.

I think that that web page should have been shut down within the
hour as any competent web person could have confirmed the leak with
a few minutes' inspection of the page source.

> -Jim P.
Bob

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Alexander Sotirov
Jim Popovitch wrote:
> 7 days?   "industry practice"?   Come on Bob I know you know that large
> corporations can't feed a cat in 7 days let alone make unscheduled
> website changes that fast.  Change control approvals alone would include
> 14 or more days in most enterprises.   Why the rush to "say so"?

Why should a security researcher waste their time with a vendor who can't even
acknowledge the receipt of a security notification in 7 days? Even the OIS
guidelines (which are pretty heavily vendor biased) suggest that vendors should
respond to notifications no later than 7 days (3 days if the researchers asks
for receipt confirmation)

If Wachovia had responded with a receipt confirmation on the same day, and
followed up in a few days with the results of an initial analysis and perhaps a
case number from their bug tracking system, things might have been different.

By the way, the privacy page is not the biggest issue on Wachovia's web site. On
http://www.wachovia.com/ they have a online banking login form. The username and
password are submitted to a HTTPS url, but the form itself is not protected.
It's trivial to MITM the HTTP site and capture the data from the login form
before it is submitted (or redirect it to a server of your choice). Of course
they show a nice padlock image next to the login form, so it must be safe!

It appears that MITM is just not part of Wachovia's threat model.

Alex



signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Valdis . Kletnieks
On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

> 7 days?   "industry practice"?   Come on Bob I know you know that large
> corporations can't feed a cat in 7 days let alone make unscheduled
> website changes that fast.  Change control approvals alone would include
> 14 or more days in most enterprises.   Why the rush to "say so"?

On the other hand, I think that they *could* manage at least a "Wow d00dz, we
really *do* have a hole there" reply and at least give a handwaving about
when they'd fix it.  Of course, actually *fixing* a design flaw that big
is going to take them *months*.




pgpmZBnZhDZmO.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Tremaine Lea
On 10-Jul-07, at 7:39 PM, Jim Popovitch wrote:

> On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
>> VI. VENDOR RESPONSE
>>
>> The vendor (Wachovia Bank) was notified via their customer service
>> phone number on June 25.  We were transferred to "web support".  The
>> person answering asked us to FAX the details to her and we did so,
>> also on June 25.  We explained that we were reporting a severe
>> security problem on their web site.
>
> Severe?  All that seems to be leaked is a person's Name/Address/SSN
> number and some other details.  While this is too much info to  
> leak, I'd
> hardly say it's severe.   That same info can be easily found in  
> people's
> mailboxes weekdays between noon and 4pm.
>

Yeah, but that doesn't scale as well.

---
Tremaine Lea
Network Security Consultant
Intrepid ACL
"Paranoia for hire"




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Jim Popovitch
On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
> VI. VENDOR RESPONSE
> 
> The vendor (Wachovia Bank) was notified via their customer service
> phone number on June 25.  We were transferred to "web support".  The
> person answering asked us to FAX the details to her and we did so,
> also on June 25.  We explained that we were reporting a severe
> security problem on their web site.

Severe?  All that seems to be leaked is a person's Name/Address/SSN
number and some other details.  While this is too much info to leak, I'd
hardly say it's severe.   That same info can be easily found in people's
mailboxes weekdays between noon and 4pm.

> We stated that that if we did not hear back from them within 7 days and
> the problem was not fixed by then that we would post the problem on the
> Full Disclosure list, following accepted industry practice.

7 days?   "industry practice"?   Come on Bob I know you know that large
corporations can't feed a cat in 7 days let alone make unscheduled
website changes that fast.  Change control approvals alone would include
14 or more days in most enterprises.   Why the rush to "say so"?

-Jim P.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread scott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Maybe that's why they have the focus of some phishing attacks recently.

Easy to get the victims login,especially  if they were redirected
through another site first.
MITM made easy 101?

Regards,
   Scott



Bob Toxen wrote:
> Wachovia Bank website sends confidential information
> (social security numbers, phone number, address, etc.)
> over the Internet without encryption.
> 
> Horizon Network Security Security Advisory 07/10/2007
> http://VerySecureLinux.com/
> Jul 10, 2007
> 
> I. BACKGROUND
> 
> Wachovia Bank's official web site offers the following URL to allow
> its customers to change their privacy preferences:
> 
>  http://www.wachovia.com/privacy
> 
> Wachovia also notified its customers by U.S. Mail that they can use that
> same URL besides.
> 
> That URL has a link to the following to actually change one's
> preferences:
> 
>  http://www.wachovia.com/personal/forms/privacy_optout
> 
> Unfortunately, that page appears to be an ordinary HTML form whose
> "filled out data" then is transmitted via the "post" method to an http
> (not https) URL.
> 
> III. ANALYSIS
> 
> We inspected the page's source via our Opera browser.  (We did not
> sniff the web traffic so we are not absolutely sure that there is not
> some hidden encryption method, though there appears to be none.)
> 
> IV. DETECTION
> 
> It is trivial to inspect the page source or sniff the data to
> demonstrate the problem.  The problem has not been corrected.
> 
> V. WORKAROUND
> 
> Use a method other than their web site to exercise one's preferences.
> 
> VI. VENDOR RESPONSE
> 
> The vendor (Wachovia Bank) was notified via their customer service
> phone number on June 25.  We were transferred to "web support".  The
> person answering asked us to FAX the details to her and we did so,
> also on June 25.  We explained that we were reporting a severe
> security problem on their web site.
> 
> We stated that that if we did not hear back from them within 7 days and
> the problem was not fixed by then that we would post the problem on the
> Full Disclosure list, following accepted industry practice.
> 
> To date we have received no response and the problem remains unfixed.
> 
> VII. CVE INFORMATION
> 
> There is no CVE number.
> 
> VIII. DISCLOSURE TIMELINE
> 
> 06/25/2007  Initial vendor notification
> 06/25/2007  Vendor requested FAXed details
> 06/25/2007  Details FAXed to vendor
> 
> 07/20/2007  No vendor response
> 07/20/2007  Public disclosure on this Full Disclosure list
> 
> IX. CREDIT
> 
> This problem was discovered by Bob Toxen, one of our engineers.
> 
> X. LEGAL NOTICES
> 
> Copyright © 2007 Horizon Network Security.  All rights reserved.
> 
> Permission is granted for the redistribution of this alert electronically.
> It may not be edited without the express written consent of Horizon
> Network Security.  If you wish to reprint the whole or any part of this
> alert in any other medium other than electronically, please e-mail
> [EMAIL PROTECTED] for permission.
> 
> Disclaimer: The information in the advisory is believed to be accurate at
> the time of publishing, based on currently available information.  Use of
> the information constitutes acceptance for use in an AS IS condition and
> waiving of the right to any action against Horizon Network Security or
> its employees or contractors.
> 
> There are no warranties with regard to this information.  Neither the
> author nor the publisher accepts any liability for any direct, indirect,
> or consequential loss or damage arising from use of, or reliance on,
> this information.
> 
> We believe Wachovia Bank is obligated by California's security breach
> disclosure laws to notify its California customers who may have used
> this form and the State of California.  Other jurisdictions also may
> have notification requirements.
> 
> Bob Toxen,
> Horizon Network Security
> http://www.verysecurelinux.com   [Network & Linux/Unix Security 
> Consulting]
> http://www.realworldlinuxsecurity.com [Our 5* book: "Real World Linux 
> Security"]
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGlCkzelSgjADJQKsRAkmxAKCr4OkyXTU1GuUzoOJ2t+6CX47EUwCdHm/9
HhSRnZYhK/VA4+YZ/FBEflU=
=crs5
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/