Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/3/2009
03:56 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

New SSL Attacks Don't Change Your Web Risk

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.

There's been a a lot of talk about SSL security since last week's Black Hat conference. While these attacks are significant, I don't see them as changing the security posture of the Web.At the Black Hat security conference last week, Dan Kaminsky, director of penetration testing for IOActive pointed out, once again, that the X.509 certificates used in SSL encryption and authentication too often rely on vulnerable MD2 cryptographic hash functions. Also, security researcher Moxie Marlinspike revealed how attackers can spoof SSL certificates by including a "null" string character inside the certificate field, which then tricks the users' Web browser into accepting the attacker's code.

According to Marlinspike, it's not the SSL protocol that's the problem, it's how so many site implementations of SSL that are insecure. This includes many of the major banks, email systems, social networking sites, and more. Even most software update mechanisms.

One of the concerning aspects of Marlinspike's research, just isn't how banks, email systems, or social network sites are running vulnerable implementations of SSL -- it's that software update systems are doing the same. This needs to be a trusted process. As most users have their systems set for automatic updates, and if a malicious someone were able to spoof the connection then malware could be easily sent to the system, rather than a patch. The solution for this is simple: software makers need to digitally sign their updates.

When it comes to the weak X.509 certificates we've known about this for some time, and the industry is moving away from MD2 hashes.

Second, regarding Marlinspike, one needs to understand that SSL merely creates the secure tunnel between your system and whatever web site you're interacting - and does nothing for the security of your end point or the Web site itself. That means most any SSL attack that would result from this flaw would be a man-in-the middle attack where the bad guy would capture traffic flowing between your PC and the Web site.

Unfortunately, the Web sites you're connecting to are already wide open and vulnerable, and has been pointed out many times. Same is true for most end user systems. It's just easier to drop malware on Web sites that will infect systems, and then capture that data, or infect end points directly -- than it is to conduct man-in-the-middle attacks. So, while interesting, and serious, and a hole that needs to be plugged, it's simply another hole in the hull of a ship already taking considerable water.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27852
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in the survey feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via a textarea field. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2021-3137
PUBLISHED: 2021-01-20
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
CVE-2020-27850
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in forms import feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via the import of a GF form. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2020-27851
PUBLISHED: 2021-01-20
Multiple stored HTML injection vulnerabilities in the "poll" and "quiz" features in an additional paid add-on of Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary HTML code via poll or quiz answers. This code is interpreted by users in a privile...
CVE-2020-13134
PUBLISHED: 2021-01-20
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) admin users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1...