exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

rcsr.txt

rcsr.txt
Posted Nov 29, 2006
Authored by PAgVac

Full write up discussing password theft with Firefox using RCSR, aka Reverse Cross-Site Request attacks.

tags | paper
SHA-256 | ae4f7b381219369a7cde2ec73988e91a25e4193c848436f3362179131786ab74

rcsr.txt

Change Mirror Download
RCSR (Reverse Cross-Site Request) attacks discovered by Robert Chapin,
make the theft of passwords in Firefox extremely trivial. I encourage
you to try the attack as it can be kind of a shocking experience.

Scenario:

1. User logs into www.target.com through a typical HTML login form

2. Firefox asks the user if he/she wants to save the password -
provided that FF never asked the user to save the password for that
site before ("Remember passwords for sites" under "Options/Security"
must be *enabled*)

3. Victim user clicks on "Remember"

4. Victim user accesses an HTML page on www.target.com containing an
injected HTML form with the username and password input names *equal*
to the legitimate login form from step 1

5. Firefox fills out automatically the form with the original username
and password values

6. Victim user clicks on a malicious link

7. Credentials get sent to evil site!

Now, the form can be completely invisible by adding a bit of HTML to
the form inputs. I managed to create a form in which all you need is
trick the victim user to click on an image.


Attack walk through:

1. Enter any fake credentials on
http://ikwt.com/projects/RCSR/legit_form.html and click on "Login"

2. If "Remember passwords for sites" is enabled, FF should prompt you
to save the password.

3. Click on "Remember"

4. Now, in order to illustrate that FF will automatically fill in the
credentials on any form located on the same site which uses input
names *equal* the the legitimate form access the following URL:

http://ikwt.com/projects/RCSR/evil_form.html

If it worked, you should see the username and password field filled in
automatically by FF. Of course, an evil form like this looks very
suspicious, but this is just an example to make the point that FF
trusts and fills in the form simply because it's located on the same
site and uses input names equal to the legitimate form.

Now, in order to make our evil form more effective we just added the
following line the in the username and password fields:

style="display: none;"

Finally, we change our submit button for an image that will make a
good bait. In this case we choose beautiful Scarlett Johansson :-)

If you click on the image, you should see your credentials forwarded
to Google within the URL:

http://ikwt.dyndns.org/projects/RCSR/evil_form_2_without_JS.html



The beauty of this attack is that we don't need JavaScript, it's all
plain HTML tags. Also, there is *no* patch yet. Apparently this has
been widely exploited on myspace. I recommend everyone to research
this attack as it's highly exploitable on sites in which users can
insert HTML - either though legitimate features (i.e.: posts) or by
exploiting security bugs such as HTML injection

Notes:

- tested successfully on Mozilla Firefox 2.0
- JavaScript can also be used to exploit this vulnerability through
the 'submit()' method (only visiting the evil page is required in this
case)


Check out the following links for more info:

http://www.info-svc.com/news/11-21-2006/
http://news.zdnet.com/2100-1009_22-6137844.html
http://secunia.com/advisories/23046/
http://isc.sans.org/diary.php?storyid=1879&rss
http://www.informationweek.com/news/showArticle.jhtml?articleID=195900085
http://www.kriptopolis.org/robo-de-contrasenas-en-firefox (in Spanish)

--
pagvac
[http://ikwt.com/]
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close