Re: Adgregate ShopAd widget validation is vulnerable to replay a

看板Bugtraq作者時間17年前 (2009/04/09 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/2 (看更多)
As an update, since I submitted my first message, Adgregate changed their validation mechanism. The current method is still intermittently vulnerable to replay attacks, but now there's actually an expiration mechanism to deal with. On Tue, Apr 7, 2009 at 5:42 PM, Matthew Dempsky <matthew@dempsky.org> wrote= : > Adgregate is a "TechCrunch 50" startup that recently signed a > distribution deal with Google/DoubleClick [1]. =A0As a service, they > offer a "viral widget" intended to be hosted on untrusted third-party > sites through which consumers can enter their credit card information. > =A0According to their website, they offer over 1.2 million products > through this service. =A0More details can be found at [2]. > > Consumers are able to validate that their data entry is secure by > clicking on a "validate this widget" button within the widget. > However, the widget proves itself by simply POSTing an (apparently) > fixed (per ShopAd id) string to a fixed URL, which is trivially > vulnerable to replay attacks. =A0For example, see the (clearly bogus) > widget at [3]. =A0Of course, a more serious attacker would spend more > time reproducing the look-and-feel of the adgregate widget. > > Here's the relevant HTML that fakes the validation functionality: > > <form method=3D"POST" action=3D"https://secure.adgregate.com/AuthenticWid= get.aspx"> > <input type=3D"hidden" name=3D"widgetvalid" value=3D"1w23e4r5-ijhyffrd"> > <input type=3D"submit" value=3D"Validate this ShopAd!"> > </form> > > (Bob Ippolito first alerted me to this service and provided the above > HTML form snippet.) > > [1] http://www.techcrunch.com/2009/04/06/adgregate-markets-scores-distrib= ution-deal-with-googles-doubleclick/ > [2] http://adgregate.com/web/demo/ > [3] http://shinobi.dempsky.org/~matthew/adgregate.html >
文章代碼(AID): #19tEPX00 (Bugtraq)
文章代碼(AID): #19tEPX00 (Bugtraq)