exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA-97.20.javascript

CA-97.20.javascript
Posted Sep 14, 1999

This advisory reports a vulnerability in JavaScript that enables remote attackers to monitor a user's Web activities.

tags | remote, web, javascript
SHA-256 | 06d1ba0f88a9b2941a5df8385587fc97f434eb9673cf11f9fc2fe004b9bfc48b

CA-97.20.javascript

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----


=============================================================================
CERT* Advisory CA-97.20
Original issue date: July 8, 1997

Last Revised: September 30, 1997
Updated copyright statement

A complete revision history is at the end of this file.



Topic: JavaScript Vulnerability
- -----------------------------------------------------------------------------

The CERT Coordination Center has received reports of a vulnerability in
JavaScript that enables remote attackers to monitor a user's Web activities.
The vulnerability affects several Web browsers that support JavaScript.

The vulnerability can be exploited even if the browser is behind a firewall
and even when users browse "secure" HTTPS-based documents.

The CERT/CC team recommends installing a patch from your vendor or upgrading
to a version that is not vulnerable to this problem (see Section III. A).
Until you can do so, we recommend disabling JavaScript (see Section III.B).

We will update this advisory as we receive additional information.
Please check our advisory files regularly for updates that relate to your site.

- -----------------------------------------------------------------------------

I. Description

Several web browsers support the ability to download JavaScript programs
with an HTML page and execute them within the browser. These programs
are typically used to interact with the browser user and transmit
information between the browser and the Web server that provided the
page.

JavaScript programs are executed within the security context of the page
with which they were downloaded, and they have restricted access to other
resources within the browser. Security flaws exist in certain Web
browsers that permit JavaScript programs to monitor a user's browser
activities beyond the security context of the page with which the
program was downloaded. It may not be obvious to the browser user that
such a program is running, and it may be difficult or impossible for the
browser user to determine if the program is transmitting information
back to its web server.

The vulnerability can be exploited even if the Web browser is behind a
firewall (if JavaScript is permitted through the firewall) and even when
users browse "secure" HTTPS-based documents.

II. Impact

This vulnerability permits remote attackers to monitor a user's browser
activity, including:

* observing the URLs of visited documents,
* observing data filled into HTML forms (including passwords), and
* observing the values of cookies.


III. Solution

The best solution is to obtain a patch from your vendor or upgrade to a
version that is not vulnerable to this problem. If a patch or upgrade is
not available, or you cannot install it right away, we recommend
disabling JavaScript until the fix is installed.

A. Obtain and install a patch for this problem.

See Appendix A for the current information from vendors. We will
update the appendix when we receive further information.

B. Disable JavaScript.

Until you are able to install the appropriate patch, we recommend
disabling JavaScript in your browser. Note that JavaScript and Java
are two different languages, and this particular problem is only with
JavaScript. Enabling or disabling Java rather than JavaScript will
have no effect on this problem.

The way to disable JavaScript is specific to each browser. The
option, if available at all, is typically found as one of the Options
or Preferences settings.

........................................................................
Appendix A - Vendor Information

Below is information we have received from vendors. We will update this
appendix as we receive additional information.

HEWLETT-PACKARD
===============

For more information please refer to the HEWLETT-PACKARD SECURITY
ADVISORY "Security Advisory in Netscape shipped with HP-UX",
Document ID: HPSBUX9707-065.

User your browser to get to the HP Electronic Support Center page:

http://us-support.external.hp.com
(for US, Canada, Asia-Pacific, & Latin-America)

http://europe-support.external.hp.com (for Europe)

Click on the Technical Knowledge Database, register as a user
(remember to save the User ID assigned to you, and your password),
and it will connect to a HP Search Technical Knowledge DB page.
Near the bottom is a hyperlink to our Security Bulletin archive.
Once in the archive there is another link to our current
security patch matrix. Updated daily, this matrix is categorized
by platform/OS release, and by bulletin topic.

IBM Corporation
===============
Netscape for IBM's OS/2 Operating System is vulnerable. The vulnerable
version and the patched version are both 2.02. The latest version is
available from http:// www.internet.ibm.com/browsers/netscape/warp

To tell if you need to download and reinstall, open the Netscape folder on
the OS/2 desktop. Click on the icon marked "Installation Utility." When the
"Installation and Maintenance" program starts, make sure "02.02.00 Netscape
for OS/2" is highlighted and hit control-S. On the product status panel that
opens up, highlight "Netscape Navigator" and then press the "Service Level"
button next to it. Ignore the install date -- that's the date Navigator was
installed. If "Level" is not "000004" or later, you should download
Netscape Navigator for OS/2 from the above mentioned URL and install it.

Microsoft
=========
Microsoft Internet Explorer 3.* and 4.* are vulnerable. Microsoft has
announced their patch plans for this problem at:

http://www.microsoft.com/ie/security/update.htm

Netscape
========
Netscape Navigator/Communicator versions 2.*, 3.* and 4.* are vulnerable.
See:

http://www.netscape.com/flash4/assist/security/index.html
http://www.netscape.com/assist/security/index.html

for details.

- -----------------------------------------------------------------------------
The CERT Coordination Center thanks Vinod Anupam of Bell Labs, Lucent
Technologies, for identifying and analyzing this problem, and vendors for
their support in responding to this problem.
- -----------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see http://www.first.org/team-info/).


CERT/CC Contact Information
- ----------------------------
Email cert@cert.org

Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.

Fax +1 412-268-6989

Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA

Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key

Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce

To be added to our mailing list for advisories and bulletins, send
email to
cert-advisory-request@cert.org
In the subject line, type
SUBSCRIBE your-email-address

- ------------------------------------------------------------------------------

Copyright 1997 Carnegie Mellon University. Conditions for use, disclaimers,
and sponsorship information can be found in
http://www.cert.org/legal_stuff.html and ftp://ftp.cert.org/pub/legal_stuff .
If you do not have FTP or web access, send mail to cert@cert.org with
"copyright" in the subject line.

CERT is registered in the U.S. Patent and Trademark Office.


- ---------------------------------------------------------------------------

This file: ftp://info.cert.org/pub/cert_advisories/CA-97.20.javascript
http://www.cert.org
click on "CERT Advisories"


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history

Sept. 30, 1997 Updated copyright statement

Sept. 17, 1997 Appendix A - updated Netscape's URLs
Updated our copyright statement

July 28, 1997 Appendix A - added information for Hewlett-Packard and IBM.
Section III.A - slight wording change.

July 14, 1997 Section III.B - fixed a typographical error.

July 11, 1997 Updated Appendix A with vendor information
for vulnerable browers.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNDo7z3VP+x0t4w7BAQGyWAP9HdxBkDSOsZpIcYzAw8gy0fxCmKuHNsFb
AKulKMNGQ1nY5D50OAC7r934ACk+y2c2MycUG7wYQ58kgFVYhAIYgiggUu6PzeLd
GtocWkIklOydzS5iVJh6hDR2LkcrvAZ9u1SlCxbk+mNijDJTjmqx0Gfqujq8aXkb
JIX+OUqH6qU=
=0TUn
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close