Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-12 Thread Bob Toxen
Wachovia Bank's Web Security people did phone me late yesterday to thank
me for raising the security issue.  They also stated that they were
investigating why my initial contacts with Wachovia did not result in
an appropriate response.

They said that they also were working with their legal people to determine
what notification to consumers, if any, was required due to the California
data breach law and similar laws elsewhere.

It was not made clear whether their phone call (and their correction
of the web page) was directly due to my posting on the Full-disclosure
list or because Steve Ragan saw my posting and contacted Wachovia.


For those who questioned whether I made sufficient attempts to contact
them, please note that I talked by phone both with customer support and
web support people and then FAXed the details to the web support person
who took my call.  Note that I bothered with this at all as a courtesy
to Wachovia.  Nobody paid me for my time.

For those who questioned whether I gave them sufficient time to react,
I stated in my FAX to them, in effect, that all they had to do within
7 days was to respond to the FAX and ask for more time to deal with
the problem.  I then waited 15 days, not 7, before posting on FD after
having received no response and seeing that the problem remained.

For those who questioned my motives and suggested that I deliberately
did not make sufficient effort to contact them, well, I detailed my
3 contacts above and then got no response for 15 days.  For those who
suggested I was motivated by fame, well, I already have that.  I won't
blow my horn here but anyone is welcome to do a Google search on me.

Wachovia has fixed the problem.  They are working to ensure that future
advisories are handled properly.  Thanks to all who responded.  Shall we
put this matter to bed?

Bob Toxen,
Horizon Network Security
http://www.verysecurelinux.com   [Network  Linux/Unix Security Consulting]
http://www.realworldlinuxsecurity.com [Our 5* book: Real World Linux Security]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Toxen
On Tue, Jul 10, 2007 at 09:39:33PM -0400, Jim Popovitch wrote:
 On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
  VI. VENDOR RESPONSE

  The vendor (Wachovia Bank) was notified via their customer service
  phone number on June 25.  We were transferred to web support.  The
  person answering asked us to FAX the details to her and we did so,
  also on June 25.  We explained that we were reporting a severe
  security problem on their web site.

 Severe?  All that seems to be leaked is a person's Name/Address/SSN
 number and some other details.  While this is too much info to leak, I'd
 hardly say it's severe.   That same info can be easily found in people's
 mailboxes weekdays between noon and 4pm.
Leaking a SSN is considered serious.  My use of the term severe was
to get their attention.

  We stated that that if we did not hear back from them within 7 days and
  the problem was not fixed by then that we would post the problem on the
  Full Disclosure list, following accepted industry practice.

 7 days?   industry practice?   Come on Bob I know you know that large
 corporations can't feed a cat in 7 days let alone make unscheduled
 website changes that fast.  Change control approvals alone would include
 14 or more days in most enterprises.   Why the rush to say so?
Please read my posting more carefully.  I stated that if I did not
hear back within 7 days and the problem persisted then I would disclose
it.  All they had to do was to ask for more time and I would have granted
any reasonable extension.  Instead, it appears that they ignored my
report; discouraging that is what Full Disclosure is all about, IMO.

I think that that web page should have been shut down within the
hour as any competent web person could have confirmed the leak with
a few minutes' inspection of the page source.

 -Jim P.
Bob

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

[EMAIL PROTECTED] wrote:

On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

  

7 days?   industry practice?   Come on Bob I know you know that large
corporations can't feed a cat in 7 days let alone make unscheduled
website changes that fast.  Change control approvals alone would include
14 or more days in most enterprises.   Why the rush to say so?



On the other hand, I think that they *could* manage at least a Wow d00dz, we
really *do* have a hole there reply and at least give a handwaving about
when they'd fix it.  Of course, actually *fixing* a design flaw that big
is going to take them *months*.
  


Driver walks into a dealer and speaks to customer service:

These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom says the driver. Puzzled and
not knowing squat about slaloms, or the breaking system, the
customer service rep send the driver to a mechanic.

These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom. Someone will die! says the
driver to the mechanic... Not being able to change the auto's
design nor engineering, the mechanic is puzzled and offers to
take the information although he is even more puzzled on who
this should be directed to.

Two days later driver rambles on news stations nationwide:
Their arrogance will get people killed. I warned them repeatedly
People moan and grumble, etc., recalls, fixes...

This Wachovia thread is pointless. I see no mention or posting
to perhaps any security list (and I'm on many both public and
private) saying: Hey is there anyone who can put me in touch
with someone in the know at Wachovia on any list. All I see
is... I called customer service. So what, if you're a security
professional you will know damn well you're getting nowhere
with them. I spoke to their w3bm4ster. And? Either the poster
is looking for attention or a complete and utter idiot. If his
or her true intention was to provide a report of a security
woe concerning said business or product, he or she could have
easily jumped on any security mailing list and found the right
connection instead of rambling on the sky is falling...

Let me see:
wachovia security cissp incident +network via Google

This looks interesting:
http://www.bryceporter.com/

I would have contacted someone on this level to put me in
touch with the right person. But hey, guess its more hip
to add stupid little tags next to your resume or webpage:
I broke $INSERT_VENDOR_HERE




--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread kazaam
I got you right? The one doing just for fun researches is in duty to 
find the correct person and not the company, making big buisness, in 
providing easy access to this person?

Yes you are obviously right ^^


J. Oquendo wrote:
 [EMAIL PROTECTED] wrote:
 On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

  
 7 days?   industry practice?   Come on Bob I know you know that large
 corporations can't feed a cat in 7 days let alone make unscheduled
 website changes that fast.  Change control approvals alone would 
 include
 14 or more days in most enterprises.   Why the rush to say so?
 

 On the other hand, I think that they *could* manage at least a Wow 
 d00dz, we
 really *do* have a hole there reply and at least give a handwaving 
 about
 when they'd fix it.  Of course, actually *fixing* a design flaw that big
 is going to take them *months*.
   

 Driver walks into a dealer and speaks to customer service:

 These brake pads are extremely vulnerable to slipping during X
 conditions on a 90 degree slalom says the driver. Puzzled and
 not knowing squat about slaloms, or the breaking system, the
 customer service rep send the driver to a mechanic.

 These brake pads are extremely vulnerable to slipping during X
 conditions on a 90 degree slalom. Someone will die! says the
 driver to the mechanic... Not being able to change the auto's
 design nor engineering, the mechanic is puzzled and offers to
 take the information although he is even more puzzled on who
 this should be directed to.

 Two days later driver rambles on news stations nationwide:
 Their arrogance will get people killed. I warned them repeatedly
 People moan and grumble, etc., recalls, fixes...

 This Wachovia thread is pointless. I see no mention or posting
 to perhaps any security list (and I'm on many both public and
 private) saying: Hey is there anyone who can put me in touch
 with someone in the know at Wachovia on any list. All I see
 is... I called customer service. So what, if you're a security
 professional you will know damn well you're getting nowhere
 with them. I spoke to their w3bm4ster. And? Either the poster
 is looking for attention or a complete and utter idiot. If his
 or her true intention was to provide a report of a security
 woe concerning said business or product, he or she could have
 easily jumped on any security mailing list and found the right
 connection instead of rambling on the sky is falling...

 Let me see:
 wachovia security cissp incident +network via Google

 This looks interesting:
 http://www.bryceporter.com/

 I would have contacted someone on this level to put me in
 touch with the right person. But hey, guess its more hip
 to add stupid little tags next to your resume or webpage:
 I broke $INSERT_VENDOR_HERE




 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


-- 
greets

one must still have chaos in oneself to be able to give 
birth to a dancing star

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Bruen

While it is true that lots of folk pick on vendors for a few minutes of 
fame, the Wachovia case is slightly different.

They do have an attitude problem and are technically challenged. The basis 
for this is a law enforcement conference about six months ago. During a 
pressentation a Wachovia representative told a speaker to stop blaming the 
banks for problems. This was the third presentation this individual has 
listened to in which each speaker had blamed the banks for not doing 
enough and the frustration level was a bit high.

This only comes up because of the current Wachovia web site issue. It 
shows that there is an internal problem, worse than most, endind with the 
current situation. And no I will not indentify any of the players.

   --bob


On Wed, 11 Jul 2007, J. Oquendo wrote:

 [EMAIL PROTECTED] wrote:
 On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

 
 7 days?   industry practice?   Come on Bob I know you know that large
 corporations can't feed a cat in 7 days let alone make unscheduled
 website changes that fast.  Change control approvals alone would include
 14 or more days in most enterprises.   Why the rush to say so?
 
 
 On the other hand, I think that they *could* manage at least a Wow d00dz, 
 we
 really *do* have a hole there reply and at least give a handwaving about
 when they'd fix it.  Of course, actually *fixing* a design flaw that big
 is going to take them *months*.
 

 Driver walks into a dealer and speaks to customer service:

 These brake pads are extremely vulnerable to slipping during X
 conditions on a 90 degree slalom says the driver. Puzzled and
 not knowing squat about slaloms, or the breaking system, the
 customer service rep send the driver to a mechanic.

 These brake pads are extremely vulnerable to slipping during X
 conditions on a 90 degree slalom. Someone will die! says the
 driver to the mechanic... Not being able to change the auto's
 design nor engineering, the mechanic is puzzled and offers to
 take the information although he is even more puzzled on who
 this should be directed to.

 Two days later driver rambles on news stations nationwide:
 Their arrogance will get people killed. I warned them repeatedly
 People moan and grumble, etc., recalls, fixes...

 This Wachovia thread is pointless. I see no mention or posting
 to perhaps any security list (and I'm on many both public and
 private) saying: Hey is there anyone who can put me in touch
 with someone in the know at Wachovia on any list. All I see
 is... I called customer service. So what, if you're a security
 professional you will know damn well you're getting nowhere
 with them. I spoke to their w3bm4ster. And? Either the poster
 is looking for attention or a complete and utter idiot. If his
 or her true intention was to provide a report of a security
 woe concerning said business or product, he or she could have
 easily jumped on any security mailing list and found the right
 connection instead of rambling on the sky is falling...

 Let me see:
 wachovia security cissp incident +network via Google

 This looks interesting:
 http://www.bryceporter.com/

 I would have contacted someone on this level to put me in
 touch with the right person. But hey, guess its more hip
 to add stupid little tags next to your resume or webpage:
 I broke $INSERT_VENDOR_HERE






-- 
Dr. Robert Bruen
Cold Rain Technologies
http://coldrain.net
+1.802.579.6288

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

Bob Bruen wrote:
While it is true that lots of folk pick on vendors for a few minutes of 
fame, the Wachovia case is slightly different.


They do have an attitude problem and are technically challenged. The basis 
for this is a law enforcement conference about six months ago. During a 
pressentation a Wachovia representative told a speaker to stop blaming the 
banks for problems. This was the third presentation this individual has 
listened to in which each speaker had blamed the banks for not doing 
enough and the frustration level was a bit high.


This only comes up because of the current Wachovia web site issue. It 
shows that there is an internal problem, worse than most, endind with the 
current situation. And no I will not indentify any of the players.


   --bob
  


Mechanisms of politrix... I was doing contract work from home for a
HUGE-O-MONGOUS tech company I won't name (NDA) and was assigned to
do fw administration, configuration for a bank that outsource it to
this HUGE-O-MONGOUS monster. When we needed to implement a change
these were the steps:

Uh oh.. We're seeing attacks from network X ...

1) Call manager
2) Manager calls his manager in another state
3) That manager calls sales rep
4) Sales rep called the bank's contact
5) Bank's contact called his security team
6) Hey security team, you need to speak with your contractors
7) Security team to bank's contact ok make a conference call
8) Bank's contact to the sales rep - ok make a conference call
9) bank sales rep to HUGE-O-MONGOUS' sales rep - ok make a conference call
10) manager to manager - hey we're going to do a conference call
11) No wait... My contractor is tied up... Can we re-schedule?

In essence, when we needed to do things, it wasn't as cut and
dry as I thought it would be. In fact it was downright frustrating.
Here you are Rainwall open, NSM open about to fire off changes
but have to wait for at minimum 4 business days hoping no one
up the food chain was unavailable to make a mission critical
change.

Long story short, while at HUGE-O-MONGOUS I was surprised I
was even given the opportunity to be there - but hey contractors
liabilities, etc., legal foobarfoo wording exculpated HUGE-O-MONGOUS
company from the whole shmoo (compsec historians know the HIStory),
anyhow, I got frustrated working for them. I felt as if it was
such a dead end. Mind you I was making about $80.00 per hour
to roll out of bed and do work pretty much whenever I wanted.

Sometimes, things aren't as clear cut as one may think they are.
To me the initial Oh noes! Wachovia is evil post was nothing
more than someone itching for their Andy Warhol 15 minutes. With
that said... Off to lunch...


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Security Guy
Or hey, if you're not getting anywhere with him, talk to this guy!
http://www.belkcollege.uncc.edu/jpfoley/



 Let me see:
 wachovia security cissp incident +network via Google

 This looks interesting:
 http://www.bryceporter.com/

 I would have contacted someone on this level to put me in
 touch with the right person. But hey, guess its more hip
 to add stupid little tags next to your resume or webpage:
 I broke $INSERT_VENDOR_HERE


--

Lasciate ogne speranza, voi ch'intrate

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Jim Popovitch
On Wed, 2007-07-11 at 12:03 -0400, Bob Bruen wrote:
 While it is true that lots of folk pick on vendors for a few minutes of 
 fame, the Wachovia case is slightly different.
 
 They do have an attitude problem and are technically challenged. The basis 
 for this is a law enforcement conference about six months ago. During a 
 pressentation a Wachovia representative told a speaker to stop blaming the 
 banks for problems. This was the third presentation this individual has 
 listened to in which each speaker had blamed the banks for not doing 
 enough and the frustration level was a bit high.

So you declare the whole of Wachovia technically challenged based on the
one incident at a security conference (did all of Wachovia attend?) six
months ago?  Come on. ;-)

Wachovia, like every other large enterprise, has good, mediocre, and bad
employees.  It's a fact of life, but not a news worthy story.  I'm sure
that some days the best and brightest represent Wachovia at some
conference somewhere, and I am equally sure that some days the worst and
most deplorable represent Wachovia at some conference somewhere.  It
happens.

-Jim P.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Bruen
Hi Jim,

No, I did not declare the whole of Wachovia technically challenged based 
on the one incident at a security conference.. What I was pointing out is 
that the current problem of their failure to put up a secure web and their 
failure to respond to notification about has another data point from 6 
about months ago.

In general enterprises send only a small group of people to any given 
conference, so no, the whole of Wachovia did not attend. Nevertheless, 
when you are the one attending, you are a representive of that enterprise.

You seemed to have missed the point that I was adding to a discussion, not 
trying to create a new one. My point was in the dustbin, where it would 
have stayed, until the current discussion appeared.

 -- bob

On Wed, 11 Jul 2007, Jim Popovitch wrote:

 On Wed, 2007-07-11 at 12:03 -0400, Bob Bruen wrote:
 While it is true that lots of folk pick on vendors for a few minutes of
 fame, the Wachovia case is slightly different.

 They do have an attitude problem and are technically challenged. The basis
 for this is a law enforcement conference about six months ago. During a
 pressentation a Wachovia representative told a speaker to stop blaming the
 banks for problems. This was the third presentation this individual has
 listened to in which each speaker had blamed the banks for not doing
 enough and the frustration level was a bit high.

 So you declare the whole of Wachovia technically challenged based on the
 one incident at a security conference (did all of Wachovia attend?) six
 months ago?  Come on. ;-)

 Wachovia, like every other large enterprise, has good, mediocre, and bad
 employees.  It's a fact of life, but not a news worthy story.  I'm sure
 that some days the best and brightest represent Wachovia at some
 conference somewhere, and I am equally sure that some days the worst and
 most deplorable represent Wachovia at some conference somewhere.  It
 happens.

 -Jim P.



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


-- 
Dr. Robert Bruen
Cold Rain Technologies
http://coldrain.net
+1.802.579.6288

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Steve Ragan
The link now redirects to an HTTPS page
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bob Toxen
Sent: Tuesday, July 10, 2007 8:20 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Wachovia Bank website sends confidential
information

Wachovia Bank website sends confidential information (social security
numbers, phone number, address, etc.) over the Internet without encryption.

Horizon Network Security Security Advisory 07/10/2007
http://VerySecureLinux.com/ Jul 10, 2007

I. BACKGROUND

Wachovia Bank's official web site offers the following URL to allow its
customers to change their privacy preferences:

 http://www.wachovia.com/privacy

Wachovia also notified its customers by U.S. Mail that they can use that
same URL besides.

That URL has a link to the following to actually change one's
preferences:

 http://www.wachovia.com/personal/forms/privacy_optout

Unfortunately, that page appears to be an ordinary HTML form whose filled
out data then is transmitted via the post method to an http (not https)
URL.

III. ANALYSIS

We inspected the page's source via our Opera browser.  (We did not sniff the
web traffic so we are not absolutely sure that there is not some hidden
encryption method, though there appears to be none.)

IV. DETECTION

It is trivial to inspect the page source or sniff the data to demonstrate
the problem.  The problem has not been corrected.

V. WORKAROUND

Use a method other than their web site to exercise one's preferences.

VI. VENDOR RESPONSE

The vendor (Wachovia Bank) was notified via their customer service phone
number on June 25.  We were transferred to web support.  The person
answering asked us to FAX the details to her and we did so, also on June 25.
We explained that we were reporting a severe security problem on their web
site.

We stated that that if we did not hear back from them within 7 days and the
problem was not fixed by then that we would post the problem on the Full
Disclosure list, following accepted industry practice.

To date we have received no response and the problem remains unfixed.

VII. CVE INFORMATION

There is no CVE number.

VIII. DISCLOSURE TIMELINE

06/25/2007  Initial vendor notification
06/25/2007  Vendor requested FAXed details
06/25/2007  Details FAXed to vendor

07/20/2007  No vendor response
07/20/2007  Public disclosure on this Full Disclosure list

IX. CREDIT

This problem was discovered by Bob Toxen, one of our engineers.

X. LEGAL NOTICES

Copyright C 2007 Horizon Network Security.  All rights reserved.

Permission is granted for the redistribution of this alert electronically.
It may not be edited without the express written consent of Horizon Network
Security.  If you wish to reprint the whole or any part of this alert in any
other medium other than electronically, please e-mail
[EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate at
the time of publishing, based on currently available information.  Use of
the information constitutes acceptance for use in an AS IS condition and
waiving of the right to any action against Horizon Network Security or its
employees or contractors.

There are no warranties with regard to this information.  Neither the author
nor the publisher accepts any liability for any direct, indirect, or
consequential loss or damage arising from use of, or reliance on, this
information.

We believe Wachovia Bank is obligated by California's security breach
disclosure laws to notify its California customers who may have used this
form and the State of California.  Other jurisdictions also may have
notification requirements.

Bob Toxen,
Horizon Network Security
http://www.verysecurelinux.com   [Network  Linux/Unix Security
Consulting]
http://www.realworldlinuxsecurity.com [Our 5* book: Real World Linux
Security]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


--
No virus found in this incoming message.
Checked by AVG Free Edition. 
Version: 7.5.476 / Virus Database: 269.10.2/893 - Release Date: 7/9/2007
5:22 PM


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Bob Toxen
On Wed, Jul 11, 2007 at 12:38:54PM -0400, Steve Ragan wrote:
 The link now redirects to an HTTPS page
Thanks Steve.

This proves the value of Full Disclosure.

This seems to have changed within a few hours of my posting to Full
Disclosure rather than in the several weeks after I first alerted it.
Note that Wachovia still has not subsequently contacted me to thank me,
acknowledge my work, or to threaten me.

Yes, the page that consumers can get to by navigating Wachovia's web site
(or in response to the paper mail Wachovia sent out) now is the
following, which posts using https to provide strong encryption:

  https://www.wachovia.com/personal/forms/privacy_optout

It has comments with time-stamps of late yesterday, after I disclosed
on the list:

 !-- Vignette V6 Tue Jul 10 19:28:33 2007 --


I do note that the existing URL:

 http://www.wachovia.com/personal/forms/privacy_optout

still exists and is accessible.

That http page still appears to post the SSN, etc. unencrypted.
Clearly, someone needs to delete the old page or only allow it as https.
Of course, this is a very minor issue as there is no way for a consumer
trip over this page accidentally.

I wonder if Wachovia will follow the California state breach security
policy.


Bob


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Bob Toxen
 Sent: Tuesday, July 10, 2007 8:20 PM
 To: full-disclosure@lists.grok.org.uk
 Subject: [Full-disclosure] Wachovia Bank website sends confidential
 information
 
 Wachovia Bank website sends confidential information (social security
 numbers, phone number, address, etc.) over the Internet without encryption.
 
 Horizon Network Security Security Advisory 07/10/2007
 http://VerySecureLinux.com/ Jul 10, 2007
 
 I. BACKGROUND
 
 Wachovia Bank's official web site offers the following URL to allow its
 customers to change their privacy preferences:
 
  http://www.wachovia.com/privacy
 
 Wachovia also notified its customers by U.S. Mail that they can use that
 same URL besides.
 
 That URL has a link to the following to actually change one's
 preferences:
 
  http://www.wachovia.com/personal/forms/privacy_optout
 
 Unfortunately, that page appears to be an ordinary HTML form whose filled
 out data then is transmitted via the post method to an http (not https)
 URL.
 
 III. ANALYSIS
 
 We inspected the page's source via our Opera browser.  (We did not sniff the
 web traffic so we are not absolutely sure that there is not some hidden
 encryption method, though there appears to be none.)
 
 IV. DETECTION
 
 It is trivial to inspect the page source or sniff the data to demonstrate
 the problem.  The problem has not been corrected.
 
 V. WORKAROUND
 
 Use a method other than their web site to exercise one's preferences.
 
 VI. VENDOR RESPONSE
 
 The vendor (Wachovia Bank) was notified via their customer service phone
 number on June 25.  We were transferred to web support.  The person
 answering asked us to FAX the details to her and we did so, also on June 25.
 We explained that we were reporting a severe security problem on their web
 site.
 
 We stated that that if we did not hear back from them within 7 days and the
 problem was not fixed by then that we would post the problem on the Full
 Disclosure list, following accepted industry practice.
 
 To date we have received no response and the problem remains unfixed.
 
 VII. CVE INFORMATION
 
 There is no CVE number.
 
 VIII. DISCLOSURE TIMELINE
 
 06/25/2007  Initial vendor notification
 06/25/2007  Vendor requested FAXed details
 06/25/2007  Details FAXed to vendor
 
 07/20/2007  No vendor response
 07/20/2007  Public disclosure on this Full Disclosure list
 
 IX. CREDIT
 
 This problem was discovered by Bob Toxen, one of our engineers.
 
 X. LEGAL NOTICES
 
 Copyright C 2007 Horizon Network Security.  All rights reserved.
 
 Permission is granted for the redistribution of this alert electronically.
 It may not be edited without the express written consent of Horizon Network
 Security.  If you wish to reprint the whole or any part of this alert in any
 other medium other than electronically, please e-mail
 [EMAIL PROTECTED] for permission.
 
 Disclaimer: The information in the advisory is believed to be accurate at
 the time of publishing, based on currently available information.  Use of
 the information constitutes acceptance for use in an AS IS condition and
 waiving of the right to any action against Horizon Network Security or its
 employees or contractors.
 
 There are no warranties with regard to this information.  Neither the author
 nor the publisher accepts any liability for any direct, indirect, or
 consequential loss or damage arising from use of, or reliance on, this
 information.
 
 We believe Wachovia Bank is obligated by California's security breach
 disclosure laws to notify its California customers who may have used this
 form and the State of California.  Other jurisdictions also may have
 

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread Peter Dawson

Reconfirming time stamp(s)

!-- Vignette V6 Wed Jul 11 16:13:41 2007 --

their policy pages was updated






On 7/11/07, Bob Toxen [EMAIL PROTECTED] wrote:


On Wed, Jul 11, 2007 at 12:38:54PM -0400, Steve Ragan wrote:
It has comments with time-stamps of late yesterday, after I disclosed
on the list:

 !-- Vignette V6 Tue Jul 10 19:28:33 2007 --



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Jim Popovitch
On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
 VI. VENDOR RESPONSE
 
 The vendor (Wachovia Bank) was notified via their customer service
 phone number on June 25.  We were transferred to web support.  The
 person answering asked us to FAX the details to her and we did so,
 also on June 25.  We explained that we were reporting a severe
 security problem on their web site.

Severe?  All that seems to be leaked is a person's Name/Address/SSN
number and some other details.  While this is too much info to leak, I'd
hardly say it's severe.   That same info can be easily found in people's
mailboxes weekdays between noon and 4pm.

 We stated that that if we did not hear back from them within 7 days and
 the problem was not fixed by then that we would post the problem on the
 Full Disclosure list, following accepted industry practice.

7 days?   industry practice?   Come on Bob I know you know that large
corporations can't feed a cat in 7 days let alone make unscheduled
website changes that fast.  Change control approvals alone would include
14 or more days in most enterprises.   Why the rush to say so?

-Jim P.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Tremaine Lea
On 10-Jul-07, at 7:39 PM, Jim Popovitch wrote:

 On Tue, 2007-07-10 at 20:20 -0400, Bob Toxen wrote:
 VI. VENDOR RESPONSE

 The vendor (Wachovia Bank) was notified via their customer service
 phone number on June 25.  We were transferred to web support.  The
 person answering asked us to FAX the details to her and we did so,
 also on June 25.  We explained that we were reporting a severe
 security problem on their web site.

 Severe?  All that seems to be leaked is a person's Name/Address/SSN
 number and some other details.  While this is too much info to  
 leak, I'd
 hardly say it's severe.   That same info can be easily found in  
 people's
 mailboxes weekdays between noon and 4pm.


Yeah, but that doesn't scale as well.

---
Tremaine Lea
Network Security Consultant
Intrepid ACL
Paranoia for hire




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-10 Thread Valdis . Kletnieks
On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

 7 days?   industry practice?   Come on Bob I know you know that large
 corporations can't feed a cat in 7 days let alone make unscheduled
 website changes that fast.  Change control approvals alone would include
 14 or more days in most enterprises.   Why the rush to say so?

On the other hand, I think that they *could* manage at least a Wow d00dz, we
really *do* have a hole there reply and at least give a handwaving about
when they'd fix it.  Of course, actually *fixing* a design flaw that big
is going to take them *months*.




pgpmZBnZhDZmO.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/