Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability
There seems to be some confusion regarding the exact impact of the
location.hostname vulnerability, and the ways to protect against it. I
wanted to offer a quick clarification.
1) Cookie setting (session fixation) attacks can be executed universally
and with no restrictions. This is demonstrated by the originally
provided PoC, and is a serious security threat. A common implication
of such a flaw is that the user can be forced to authenticate within
attacker's session, implanted as a persistent cookie.
WARNING: The attack does not require the browser to interact with
the attacked site in any way. The cookie is set somewhere else and
ahead of the visit. In other words, the fact your site runs IIS does
not make you any more secure. The fact your servers are behind Squid
in a reverse proxy mode has no significance.
Vulnerable *clients* can be protected by a proxy that rejects
requests containing a NUL character; Squid is a good example. A
safer option is to implement the prefs.js workaround recommended on
the test page and in Bugzilla, however... and an updated version of
Firefox should be available tomorrow, anyway.
2) Frame / window manipulation and cookie stealing attacks can be
executed against sites that explicitly set 'document.domain' to an
arbitrary value, even if this occurs only on a single sub-page. Some
high-profile sites do that, others don't. Still, the attack is very
much possible; I prepared a new testcase for non-believers:
http://lcamtuf.dione.cc/ffhostname_cnn.html
3) In my initial advisory, I mistakenly stated that XMLHttpRequest() can
be one of attack vectors. It can't - contrary to some sources, in
Firefox, this mechanism ignores document.domain altogether. You have
to rely on the two methods described above - but that's quite a lot,
anyway.
Cheers,
/mz