Vulnerabilities / Threats
10/10/2012
02:33 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Web API Allows Phishing Attack

A recent addition to HTML5, the Fullscreen API, appears to be easily abused.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
A proof-of-concept phishing attack designed by a Stanford computer science graduate student offers a reminder that new Web technology can reinvigorate old risks.

Feross Aboukhadijeh, a Web designer, developer, and computer security researcher, has developed a way to spoof websites using the relatively new HTML5 Fullscreen API. As its name suggests, the API allows Web developers to present content in full-screen mode, without the distractions of Web browser interface elements.

Aboukhadijeh has published details of the attack on his website, which includes a link that opens a fake Bank of America page to demonstrate the technique. The attack uses the Fullscreen API to hide the interface elements of the user's browser--the chrome and the URL address bar--beneath an image of those interface elements. This prevents the user from knowing which website he is visiting.

Browser vendors have been aware of the potential for using this API for spoofing since it was first proposed. The Fullscreen API specification includes a "Security and Privacy Considerations" section that advises browser makers to implement an overlay element that tells the end user when full-screen mode has been initiated. "This is to prevent a site from spoofing the end user by recreating the user agent or even operating system environment when fullscreen," the specification states.

[ Read Why Huawei Has Congress Worried. ]

Unfortunately, Apple's Safari browser, version 6.01 and later, provides little or no sign that full-screen mode has been activated. Google Chrome, version 22 and later, offers some notice, though as Aboukhadijeh observes, the notification is "pretty subtle and easily missed." Mozilla Firefox, version 10 and later, alerts the user with a conspicuous notification.

Microsoft Internet Explorer 10 does not presently support the HTML5 Fullscreen API, although IE under Windows 8's Metro interface is always full screen. Microsoft confronted the issue of browser UI abuse in 2004 and placed constraints on chromeless popup windows in its Windows XP SP2 update to reduce the risk of spoofing.

Aboukhadijeh's attack depends on social engineering rather than flawed code. Although it's certainly less worrisome than a technical vulnerability that could allow the remote takeover of a computer, it's also less easily fixed--human gullibility can't be patched and defining adequate notification for an interface change isn't as simple as modifying code to prevent a crash.

There are a variety of ways to deceive people online and the only way to mitigate that risk is constant vigilance. In Apple's case, following the security recommendations in Fullscreen API specification would help, too.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
10/15/2012 | 9:19:07 AM
re: Web API Allows Phishing Attack
I love reading about security exploits in information technology. Way to go Doubleheader for locating and sharing the exploit and now it is being properly addressed. With small warning that are easily overlooked it is surprising that these are not more common today than ever before due to the presence of HTML5 on the web. Disappointing to read that this was clearly addressed under securities and not brought more to the forefront as a much larger vulnerability than outlined.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.