Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/13/2009
02:54 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IE 7 and 8 Default Security Leaves Intranets At Risk

Researcher details attacks on intranets that abuse Internet Explorer 7 and 8 security default settings

Internet Explorer 7 and 8's default security settings can be unsafe for internal, intranet-based Web applications, according to newly published research.

Cesar Cerrudo, founder and CEO of Argeniss, a security consulting firm in Argentina, has demonstrated that IE's default features for intranet "zones" can be abused to wage attacks on internal Web applications both from the outside and from within the organization. Cerrudo has released his findings, which show how default settings can be used both to detect and exploit vulnerabilities in intranet applications.

The attacks take advantage of the fact that local intranet zone settings are inherently more trusted than ones in the Internet zone. But Internet-facing Web apps are basically safe from these attacks: "IE Internet zone settings are stronger, and they will prevent and mitigate most of the attacks," he says.

Microsoft was not available for comment at the time of this posting.

Researchers previously have demonstrated attacks on intranets using internal host scanning and attacks on internal hosts, for instance, he says, but not the type of practical cross-site scripting, SQL injection, and cross-site request forgery attacks on these intranet apps from the Internet that he is demonstrating with IE. "All [of] this is done from the Internet, abusing Internet Explorer's weak default-security settings," Cerrudo says.

One of the first big revelations of how vulnerable intranets can be came at Black Hat USA in 2006, when Jeremiah Grossman and Robert "RSnake" Hansen demonstrated how Java Script-based attacks against Websites could also be used to hack internal Web apps using XSS.

"Cesar is expounding upon the research and making it IE-specific, [with] more and better examples of how attacks could happen," says Grossman, CTO at WhiteHat Security.

Cerrudo's research points out how IE 7 and 8's default security settings in the so-called Local Intranet Zone are more "relaxed" than the ones in the Internet zone. According to Cerrudo, the weak default settings are: automatic logon in the intranet zone; Websites with fewer privileges can reach this zone; script-initiated windows are allowed regardless of their size or position; Websites can open windows with an address or status bar; and Version 8's XSS filter is disabled by default.

These features in various instances and combinations leave intranet-based apps vulnerable to phishing, cross-site scripting and SQL injection-combination attacks, and cross-site request forgery attacks, for instance. An attacker could perform these attacks to steal, modify, or wipe out data on a server, as well as take over a server altogether, according to the research.

Cerrudo says the attacks he has demonstrated require some insider information on the targeted internal Web-based applications. "I demonstrate practical intranet Web application attacks that only require some insider information -- Web applications information -- and also how to detect vulnerabilities in order to exploit them," he says.

"All of [these] attacks are dangerous. The result of the attacks go from hosts/servers/network compromises to data being stolen, deleted, modified, etc.," he says.

So how can organizations protect their intranet apps from such attacks? Cerrudo says first, be sure intranet Web apps are secure and free of vulnerabilities that can be exploited. Also, change IE default security settings, although that isn't necessarily straightforward: "This can cause problems to users since some functionality could break, browsing experience won't be nicer, etc.," he says. "I would set intranet zone settings the same as default Internet zone settings. If this causes problems with some Websites, then these Websites could be added to Trusted Sites security zone and set in that zone the needed settings."

WhiteHat's Grossman says changing the settings is worth any headache it will cause. "While it would break certain use-cases, I think it's worth it," Grossman says. "Do not [automatically] allow connections to the intranet originated from Internet Web pages. Make users explicitly allow it."

Meanwhile, Cerrudo says it would be helpful if IE supported custom security zones. "Something that IE is lacking is allowing the user to create custom security zones where Websites can be added and security settings can be set based on specific needs," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.
CVE-2020-11533
PUBLISHED: 2020-04-04
Ivanti Workspace Control before 10.4.30.0, when SCCM integration is enabled, allows local users to obtain sensitive information (keying material).
CVE-2020-11529
PUBLISHED: 2020-04-04
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.
CVE-2020-11527
PUBLISHED: 2020-04-04
In Zoho ManageEngine OpManager before 12.4.181, an unauthenticated remote attacker can send a specially crafted URI to read arbitrary files.
CVE-2020-11528
PUBLISHED: 2020-04-04
bit2spr 1992-06-07 has a stack-based buffer overflow (129-byte write) in conv_bitmap in bit2spr.c via a long line in a bitmap file.