Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/13/2009
02:54 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IE 7 and 8 Default Security Leaves Intranets At Risk

Researcher details attacks on intranets that abuse Internet Explorer 7 and 8 security default settings

Internet Explorer 7 and 8's default security settings can be unsafe for internal, intranet-based Web applications, according to newly published research.

Cesar Cerrudo, founder and CEO of Argeniss, a security consulting firm in Argentina, has demonstrated that IE's default features for intranet "zones" can be abused to wage attacks on internal Web applications both from the outside and from within the organization. Cerrudo has released his findings, which show how default settings can be used both to detect and exploit vulnerabilities in intranet applications.

The attacks take advantage of the fact that local intranet zone settings are inherently more trusted than ones in the Internet zone. But Internet-facing Web apps are basically safe from these attacks: "IE Internet zone settings are stronger, and they will prevent and mitigate most of the attacks," he says.

Microsoft was not available for comment at the time of this posting.

Researchers previously have demonstrated attacks on intranets using internal host scanning and attacks on internal hosts, for instance, he says, but not the type of practical cross-site scripting, SQL injection, and cross-site request forgery attacks on these intranet apps from the Internet that he is demonstrating with IE. "All [of] this is done from the Internet, abusing Internet Explorer's weak default-security settings," Cerrudo says.

One of the first big revelations of how vulnerable intranets can be came at Black Hat USA in 2006, when Jeremiah Grossman and Robert "RSnake" Hansen demonstrated how Java Script-based attacks against Websites could also be used to hack internal Web apps using XSS.

"Cesar is expounding upon the research and making it IE-specific, [with] more and better examples of how attacks could happen," says Grossman, CTO at WhiteHat Security.

Cerrudo's research points out how IE 7 and 8's default security settings in the so-called Local Intranet Zone are more "relaxed" than the ones in the Internet zone. According to Cerrudo, the weak default settings are: automatic logon in the intranet zone; Websites with fewer privileges can reach this zone; script-initiated windows are allowed regardless of their size or position; Websites can open windows with an address or status bar; and Version 8's XSS filter is disabled by default.

These features in various instances and combinations leave intranet-based apps vulnerable to phishing, cross-site scripting and SQL injection-combination attacks, and cross-site request forgery attacks, for instance. An attacker could perform these attacks to steal, modify, or wipe out data on a server, as well as take over a server altogether, according to the research.

Cerrudo says the attacks he has demonstrated require some insider information on the targeted internal Web-based applications. "I demonstrate practical intranet Web application attacks that only require some insider information -- Web applications information -- and also how to detect vulnerabilities in order to exploit them," he says.

"All of [these] attacks are dangerous. The result of the attacks go from hosts/servers/network compromises to data being stolen, deleted, modified, etc.," he says.

So how can organizations protect their intranet apps from such attacks? Cerrudo says first, be sure intranet Web apps are secure and free of vulnerabilities that can be exploited. Also, change IE default security settings, although that isn't necessarily straightforward: "This can cause problems to users since some functionality could break, browsing experience won't be nicer, etc.," he says. "I would set intranet zone settings the same as default Internet zone settings. If this causes problems with some Websites, then these Websites could be added to Trusted Sites security zone and set in that zone the needed settings."

WhiteHat's Grossman says changing the settings is worth any headache it will cause. "While it would break certain use-cases, I think it's worth it," Grossman says. "Do not [automatically] allow connections to the intranet originated from Internet Web pages. Make users explicitly allow it."

Meanwhile, Cerrudo says it would be helpful if IE supported custom security zones. "Something that IE is lacking is allowing the user to create custom security zones where Websites can be added and security settings can be set based on specific needs," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16029
PUBLISHED: 2020-01-26
A vulnerability in the application programming interface (API) of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to change user account information which can prevent users from logging in, resulting in a denial of service (DoS) condition of the web interface. Th...
CVE-2020-3115
PUBLISHED: 2020-01-26
A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerabi...
CVE-2020-3121
PUBLISHED: 2020-01-26
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplie...
CVE-2020-3129
PUBLISHED: 2020-01-26
A vulnerability in the web-based management interface of Cisco Unity Connection Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker c...
CVE-2020-3131
PUBLISHED: 2020-01-26
[CVE-2020-3131_su] A vulnerability in the Cisco Webex Teams client for Windows could allow an authenticated, remote attacker to cause the client to crash, resulting in a denial of service (DoS) condition. The attacker needs a valid developer account to exploit this vulnerability. The vulnerability i...