[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.50.0508091555210.10134-100000@kegger.national-security.net>
Date: Wed Aug 10 00:34:46 2005
From: fd at ew.nsci.us (fd@...nsci.us)
Subject: Insecure http pages referencing https
form-actions.
Today I realized that many "secured" web sites reference their secure
login page from an insecure page. For example:
http://www.some-luser.com/login.html:
<form action="https://cgi.some-luser.com/login-cgi">
user: <input name=user>
pass: <input name=pass>
</form>
The actual post is secure (several assumptions made), but not the page
which contains the form itself! In my mind, it would be rather trivial to
man-in-the-middle or DNS poison www.some-luser.com and change the content
of login.html's form-action to http://not-secure-luser.com/login-cgi. If
Eve hosts not-secure-luser.com then login credentials will be posted to
her rather than to where it is expected.
With some javascript magic, Eve could even post the victim back into
https://cgi.some-luser.com/login-cgi. Except for the extra delay and
perhaps a "please wait while you are logged in" page (ajax anyone?), Bob
*and* Alice would never know.
Am I missing something here? Are "secure" web designers really
overlooking the obvious?
-Eric
--
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062
http://www.nsci.us/
Voice: (503) 293-7656
Fax: (503) 885-0770
--
Here's a topic: foo. Discuss amongst yourselves ...
Powered by blists - more mailing lists