Application Security Weekly for August 11

A researcher found out that you can discover if a user is in incognito mode in Chrome using a timing attack.

https://blog.jse.li/posts/chrome-76-incognito-filesystem-timing/

 

That Microsoft RDP attack we talked about earlier?  Yeah, it works in Azure.

https://thehackernews.com/2019/08/reverse-rdp-windows-hyper-v.html?m=1

 

In unrelated news, Microsoft has launched Azure Security Lab, a safe space to do appsec testing.

https://msrc-blog.microsoft.com/2019/08/05/azure-security-lab-a-new-space-for-azure-research-and-collaboration/

 

A cool bug was discovered in the Electron Framework.

https://www.contextis.com/en/blog/basic-electron-framework-exploitation

 

Frequent readers know that I am no fan of Apple's closed garden when it comes to app testing.  Well, it might be opening a little.  They have enhanced their bug bounty, and more importantly are going to offer quasi-jailbroken phones to researchers.  I'll be in line for that.

https://www.theverge.com/2019/8/8/20756629/apple-iphone-security-research-device-program-vulnerabilities

 

That's the news!

Application Security This Week for August 4

The Capital One breach leads the news this week, for a dozen good reasons.

https://start.jcolemorrison.com/the-technical-side-of-the-capital-one-aws-security-breach/

 

Reeeeeely good writup on Crypto attacks from Checkpoint.  More than just reading the unreadable, ya know.

https://research.checkpoint.com/cryptographic-attacks-a-guide-for-the-perplexed/

 

The Node Package Manager is in the news again, thanks to a huge kerfuffle related to someone injecting malware into a much-used package.  Think before you import, people.

https://harry.garrood.me/blog/malicious-code-in-purescript-npm-installer/

https://medium.com/commitlog/the-internet-is-at-the-mercy-of-a-handful-of-people-73fac4bc5068

 

Credential stuffing attacks are outpacing phishing, sayth Akamai.

https://www.theregister.co.uk/2019/07/31/black_hats_hate_banks_says_akamai/

 

And we are still talking about weakening encryption, of course:

https://www.forbes.com/sites/kalevleetaru/2019/07/26/the-encryption-debate-is-over-dead-at-the-hands-of-facebook/#37320cb05362

 

That's the news, people.  Stay safe.

Facebook, Passport, and the Human Condition

Facebook is under heavy fire for privacy "violations", although they never did anything they didn't explicitly tell users they were going to do. Also, no privacy laws apply to what they did wrong. Also, if the product is free, you are the product. Blah blah. Fact is, in a capitalist society, companies are going to do whatever they can within the constraints of the law to make a buck. If they make enough customers angry, they will eventually lose money, and that is the incentive to stay on the straight and narrow.

Anyway, in case you hadn't heard, there are a lot of things going on here that has raised the ire of Facebook's customer base. For years, I have demoed using the Open Graph API to download either all of the public users on Facebook, or friends of friends private information. Of course, as we all know, Cambridge Analytica used that same API to write a slick little plugin to gather a boatload of information and sell it to political candidates, which influenced elections, and they are kinda important around here, so people got mad. Technically, they did nothing that hasn't been done a hundred times (hell, I have written software that does it) but this time people got mad. So be it.

Then there is the fake news, and the tracking, and watching where you go on the web even if you don't have a Facebook account, and and and you get the idea. Folks got mad. Facebook did the whole mea culpa thing, as one does, and their customer count still goes up. As the time of this writing, they are still the most used application on the planet. Roger that.

Once upon a time

Let's get in the wayback machine. No, not Brewster Kahle's WayBack Machine, just an imaginary one. In 2002, I was at TechEd signing the newly minted Professional Visual Basic.NET book, and trying to keep up with the Wrox contingent (news flash: Brits can drink.) In the evenings, I was working on an article about the second incarnation of Microsoft Passport. The original version was a try at what is now Active Directory Federated Services, but this version was a wholistic internet identity. It would track your calendar, your credit cards, your contact list, your email, everything, and help you out. If you bought plane tickets, it would have your Visa at the ready, and automatically add flight to your calendar. If your kids emailed to tell you they needed cupcakes for the bake sale, BANG, on the shopping list.

But … there was a problem. The user base went shitfuck. Some of the comments I remember were "I'll sooner throw my computer in the river than give Microsoft access to my calendar and credit cards" and "Are you saying they will look at our email and change our data without asking first" and "The day will never come that I will let Microsoft log me into my bank".

Yeah.

Anyway, if you of a certain age, and I told you the names of the people what wrote those things, you would instantly recognize them, I promise you. Me, I thought Passport was pretty neat. Not many other people thought it was neat. Court cases were filed. People quit Microsoft jobs (really!) over this. It was a disaster.

Fast forward

So here we are today. Facebook is under fire for using the data that people gave them freely to buy Mark more fast cars and hot women and blow, and people are mad. Meanwhile, they are logging into American Airlines, using their stored credentials, and their saved credit card info, and the email from American automatically adds the flight to their Google calendar.

Suffice it to say, in 15 years we'll be having this same, exact conversation about some other technology, maybe facial recognition and brain scanning or something. I dunno. William Gibson probably does. Either way, Facebook has breached the front. In not too long, the user base will have gotten used to it, and whatever is after Facebook will sell our data with impunity.

Application Security This Week for July 28

It's 1994 again! Encryption is on the table for law enforcement. Be ready for entry in the back door soon.

https://www.theregister.co.uk/2019/07/23/us_encryption_backdoor/

If you want to read about the LAST time we tried this, I recommend Matt Curtin's book Brute Force.

https://www.amazon.com/Brute-Force-Cracking-Encryption-Standard/dp/1441918957

 

Very good analysis of the XML eXternal Entity (XXE) attack.

https://www.synack.com/blog/a-deep-dive-into-xxe-injection/

 

Gitlab's Global Developer Report has some interesting security insights.

https://learn.gitlab.com/c/2019-global-develope

 

If you write mobile apps, and your vulnerability assessment mentions "a third party malicious app could exploit this" pay attention to it.  It's really happening in the wild.

https://www.infosecurity-magazine.com/news/uptick-in-ransomware-mobile/

 

That's the news!

 

Application Security This Week for July 21

Awesome paper presented in France covering XXE - really good research.  Worth a read.

https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation

 

Those who have taken my training know how I talk about protecting the soft meaty middle - well, Slack is proving that user accounts are the gift that keeps on giving.  They reset passwords - from a breach 4 years ago.  

https://thehackernews.com/2019/07/slack-password-data-breach.html

https://www.theregister.co.uk/2019/07/19/2015_database_hack_slack/

 

Really neat tool for hooking executables in Windows.  I tried it, it's super neat.  

https://github.com/everdox/InfinityHook

 

Here's an I-wish-it-was-an-OWASP-project example.  Tons of research on Command injection.

https://hackersonlineclub.com/command-injection-cheatsheet/

 

That's the news folks.  Stay safe out there.

Application Security This Week for July 14

A wonderful human being put together a list of resources about hacking mainframe systems, worth a look if your organization is run on the big metal.

https://github.com/samanL33T/Awesome-Mainframe-Hacking/

 

Apple had a not-good-very-bad week.  First, the OpenIF Foundation dinged the Mac implementation of "Sign in with Apple"

https://nakedsecurity.sophos.com/2019/07/08/privacy-and-security-risks-as-sign-in-with-apple-tweaks-open-id-protocol/

Then it was discovered that all of the magic of Zoom's conference software is due to a web server installed on MacOS, which you can't remove!  (Heeeey!)

https://www.engadget.com/2019/07/09/zoom-will-remove-server-behind-mac-security-hole/?ncid=txtlnkusaolp00000618

 

Rhino Security released a new version of CloudGoat, an insecure-by-design cloud deployment tool.  

https://rhinosecuritylabs.com/aws/cloudgoat-walkthrough-rce_web_app/

 

One of my favorite attacks against file uploads that take zip files is the zipbomb.  Well, someone made a really nice one.

https://www.vice.com/en_us/article/597vzx/the-most-clever-zip-bomb-ever-made-explodes-a-46mb-file-to-45-petabytes

 

There is a flaw in the Android update system that allows attackers to modify updates on the fly.  Oh, and it is being exploited in the wild.

https://thehackernews.com/2017/12/android-malware-signature.html?m=1

 

That's the news, folks.  Have a safe week!

 

Application Security This Week for July 7

Good article on using fuzzers as productivity tools

https://kripken.github.io/blog/binaryen/2019/06/11/fuzz-reduce-productivity.html

Reminds me of a great talk by the remarkable Craig Stuntz, worth a read.

https://speakerdeck.com/craigstuntz/high-speed-bug-discovery-with-fuzzing

 

Firefox will automatically trust certificates trusted by your OS

https://thehackernews.com/2019/07/firefox-https-security.html?m=1

In other Firefox news, the UK is up in arms about Secure DNS breaking the Great British Pornwall

https://www.zdnet.com/article/uk-isp-group-names-mozilla-internet-villain-for-supporting-dns-over-https/

 

Next time I ping your site for not using X-FRAME-OPTIONS on a DNS endpoint, well, HAH I TOLD YOU SO NAAA NAA NAA

https://medium.com/intigriti/gotcha-taking-phishing-to-a-whole-new-level-72eda9e30bef

 

And that's the news, folks.

Application Security This week for June 30

Fascinating look into Internet routing that caused an outage last week.  We are really building this city on a bed of sticks.

https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/

 

Not my normal fare for this newsletter, but Microsoft added a secure vault to OneDrive.  Not in the US yes, but my Australian friends can give it a try.

https://www.windowscentral.com/microsoft-announces-onedrive-personal-vault-secure-area-within-your-onedrive

 

There is a directory traversal vulnerability in ... this blog!  Please don't hack my.  I'll update later today.

https://seclists.org/fulldisclosure/2019/Jun/44

 

MongoDB is adding field level encryption.  Now if folks would just use the authentication features ...

https://www.wired.com/story/field-level-encryption-databases-mongobd/

 

Found a VERY cool tool that lists known vulnerabilities in default containers.

https://vulnerablecontainers.org/

 

A weird enge case forces the npm deployment script to push the .git folder.  Remember, complexity is the enemy of security.

https://npm.community/t/npm-6-9-1-is-broken-due-to-git-folder-in-published-tarball/8454/2

 

And that's the news folks.

Application Security This Week for June 23

Google has decided that the API that underpins the Chrome extension kit is too powerful - and they aren't wrong.  But the changes appear to be killing adblockers.  Strange, that.

https://www.theregister.co.uk/2019/06/17/chrome_extensions_security/

 

No, you aren't reading an old edition of this newsletter.  There really is another Orable Weblogic deserialization bug.

https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2729-5570780.html

https://www.theregister.co.uk/2019/06/19/oracle_weblogic_emergency/

 

Good writeup on the current state of 2 factor authorization.

https://blog.trailofbits.com/2019/06/20/getting-2fa-right-in-2019/

 

That's the news, folks.

 

Application Security This Week for June 16

Happy Father's Day!

 

Great writeup by Rapid7 about security-focused HTTP headers.

https://blog.rapid7.com/2019/05/30/hidden-helpers-security-focused-http-headers/?utm_medium=twitter&utm_content=http-headers&CS=twitter

 

Phishing kit used by the bad guys has a gaping insecure file upload bug.

https://www.theregister.co.uk/2019/06/05/akamai_phishing_kit_vuln/

 

"But it's inside the firewall!" Here's 18 cases of insider attacks in the banking industry.

https://medium.com/bugbountywriteup/18-cases-of-insider-bank-threats-16a29dcfca18

 

And, a little security related humor to lighten your week.

https://medium.com/commitlog/how-to-design-for-the-web-in-2019-a0be4d6702e2

 

And that's the news.

 

 

Bill Sempf

Husband. Father. Pentester. Secure software composer. Brewer. Lockpicker. Ninja. Insurrectionist. Lumberjack. All words that have been used to describe me recently. I help people write more secure software.

 

 

profile for Bill Sempf on Stack Exchange, a network of free, community-driven Q&A sites

MonthList