Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <etPan.53dd4a95.327b23c6.d5d9@Thor.local>
Date: Sat, 2 Aug 2014 16:31:17 -0400
From: Donald Stufft <donald@...fft.io>
To: gremlin@...mlin.ru, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Enforce use of HTTPS for
 MathJax in IPython

On August 2, 2014 at 1:08:12 PM, gremlin@...mlin.ru (gremlin@...mlin.ru) wrote:
> On 31-Jul-2014 23:23:18 -0500, Kyle Kelley wrote:
> 
> > Summary: When using the IPython notebook without encryption
> > (i.e. running the server on HTTP instead of HTTPS), mathjax is
> > loaded over HTTP. An attacker with fortuitous network position
> > could execute code on a local IPython notebook by modifying the
> > mathjax javascript.
> 
> HTTPS wouldn't help much: the attackers (most of which are known to
> use 3-letter names) can (and they really do) issue a fake certificate
> for their decoy servers.

There are attackers other than 3 letter agencies.

> 
> In general, nothing received from the Net could be trusted. And the
> HTTPS doesn't guarantee anything beyond "this certificate was signed
> by this CA" - was that voluntary or forced.
> 
> Enforcing HTTPS for the whole site is even more stupid: normally only
> user-specific data (login procedure, personal settings for registered
> users, etc) should be forced to go through HTTPS; everything else
> should normally be left up to the users' wish.

This is incredibly wrong. First off if only your login procedures, personal
settings, etc are password protected then it's trivial for a MITM to simply
strip the HTTPS from the link to the login page. The vast bulk of users simply
won't notice that they are visiting a page via HTTP instead of HTTPS.
Furthermore, even if you manage to login over HTTPS, HTTP, being a stateless
protocol, includes authentication credentials with every request. This is
typically taken in the form of cookies which are sent with every request. In
order to protect these cookies they need to only be sent over a HTTPS connection.
Even if you set cookies to secure, that still doesn't prevent an attacker from
writing cookies and doing a fixation attack to trick a victim into being logged
into another account. Perhaps they don't notice this and they do something
sensitive, such as adding a credit card to their account, and in reality they
are adding their credit card to another account.

Even simply redirecting to HTTPS isn't enough, because a MITM attacker could
simply intercept the redirect and terminate the TLS themselves and return a
plaintext page. You must use HSTS with a long timeout to enforce HTTPS for the
entire domain.

Even with HSTS on just that single domain isn't enough, you need to use the
includeSubdomains option otherwise a MITM attacker simply needs to convince
your browser, through a redirect or embedded image or what have you, to visit
a non-existant sub domain of your domain which, due to the nature of browser's
cookie domain policy, will be able to write cookies doing a session fixation
or even read cookies if you don't have them set to secure.

Finally if the domain that is to be protected is a subdomain itself, than the
parent domain must also have HTTPS enforced via HSTS with includeSubdomains
because again, the browser policy allows a parent domain to set a cookie that
the sub domains will read allowing yet another avenue for a fixation attack.

So sure, this doesn't prevent a TLA with access to a root key doing a targeted
attack against a site, however it does prevent an attacker who just happens
to be on the same network (Coffeshop Wifi etc) from attacking you.

> 
> But the terminal state of mental disability is... yes, using scripts
> from outer sources: intercepting one popular source like
> https://ajax.googleapis.com/ajax/libs/jquery/*/jquery.min.js will
> allow the attacker to not bother of intercepting other sites directly.
> 
> > This issue was fixed in the git master branch (development branch
> > for upcoming v. 2.2) with commit cf793ebc4, on 7/31/2014:
> 
> Not a vulnerability, not a fix.
> 

Absolutely is a vuln and is a fix.

-- 
Donald Stufft
PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.