lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 Jun 2010 03:58:16 +0530
From: Lavakumar Kuppan <lava@...labs.org>
To: full-disclosure@...ts.grok.org.uk
Subject: Chrome and Safari users open to stealth HTML5
	Application Cache attack

Google Chrome and Safari support HTML5 Application Cache.
But unlike Firefox and Opera they do not ask for user permission before
allowing a site to create an Application Cache.

On unsecured networks, attackers could stealthily
create malicious Application Caches in the browser of victims for even HTTPS
sites.
It has always been possible to poison the browser cache and compromise the
victim's account for HTTP based sites.
With HTML5 Application Cache, it is possible to poison the cache of even
HTTPS sites.

Details -
http://blog.andlabs.org/2010/06/chrome-and-safari-users-open-to-stealth.html

I have also released a POC using which both Facebook and Gmail can be
compromised.

POC - http://www.andlabs.org/tools/imposter/imposter_poc.zip

Video - http://www.youtube.com/watch?v=00sKMMyXJsI


Cheers,
Lava
http://www.andlabs.org

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ