Major Browsers Have JS Pop-Up Flaw 397
An anonymous reader writes "Secunia is warning that several popular browsers contain a vulnerability that could allow a phishing attack. 'The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open -- for example, a prompt dialog box -- which appears to be from a trusted site,' Secunia said. The browsers include the latest versions of IE, IE for Mac, Safari, iCab, Mozilla, Mozilla Firefox and Camino. Opera 7 and 8 are also affected but not 8.01."
Dupe, or just not fixed yet? (Score:3, Informative)
Too bad if it's just a symptom of the problem(s) just not being fixed yet...
Re:Dupe, or just not fixed yet? (Score:2)
These things have a way of creeping back up on us.
The frame injection vulnerability [secunia.com] seems to have reemerged as well.
Deer Park is vulnerable, as is Firefox & Mozilla. Eeeeeek!
Lets see.... (Score:4, Interesting)
It is the only browser not affected....
And now this leaked out where reports can only say that one browser does not suffer from this issue.
Re:Lets see.... (Score:5, Insightful)
Actually, Konqueror 3.4.1 isn't affected either (it displays the hostname in the popup title bar).
These kinds of security holes are far harder to find than simple buffer overflows, because the real flaw is that the user misunderstands information that is presented in a particular context. There's no real technical error, it's purely a user interface issue. You have to think about how a user would perceive any particular information under all kinds of different contexts.
This also means that open-source doesn't confer all of the security advantages that it does when applies to mistakes in the code, as everybody can see the UI even in a closed-source browser like Internet Explorer.
Re:Lets see.... (Score:2)
Regardless of the actual timetable of events, it is quite a stretch to say Konqueror appeared out of nowhere.
Re:Lets see.... (Score:2)
Hell, I haven't used it since Camino came out and was usable (back when it was called Chimera).
Lets see.... (Score:2, Insightful)
Re:Lets see.... (Score:2)
Opera? Lie? [mozillanews.org]. Nah, couldn't be.
Re:Lets see.... (Score:3, Informative)
This wasn't so much a lie as a misunderstanding. Firefox was not nominated in the "web browser" but in the "best software" category, so when Opera ASA saw that they were the only winner in the browser category, they made a news story about it. They retracted a few days later.
On topic, the vulnerability seems hardly dangerous. Not entirely sure why it deserved a news story...
Re:Lets see.... (Score:2)
Really? I think we are pretty good for the most part.
Re:Lets see.... (Score:2)
I haven't been following Opera development lately, but did they remove native Javascript support in 8.01 and rely on some Java implementation? Otherwise what would Java have to do with this bug?
Whew, I'm safe... (Score:2)
Re:Whew, I'm safe... (Score:3, Funny)
Re:Whew, I'm safe... (Score:5, Funny)
Re:Whew, I'm safe... (Score:5, Funny)
Re:Whew, I'm safe... (Score:2)
Re:Whew, I'm safe... (Score:2)
Re:Whew, I'm safe... (Score:5, Funny)
Re:Whew, I'm safe... (Score:3, Funny)
It's not a flaw according to MS... (Score:5, Interesting)
And you *know* that if Microsoft says it's not a flaw, well, then, it mustn't be a flaw.
Re:It's not a flaw according to MS... (Score:2)
Re:It's not a flaw according to MS... (Score:2, Informative)
Popup message box says (something like):
"MyBank Security Timeout occured. Please reenter your account details in the following screen".
OK/CANCEL
user clicks ok and mysterious screen pops over looking like their real screen and hey-presto, you've been phished!
Re:It's not a flaw according to MS... (Score:3, Insightful)
Error occurred between user's ears. Insert neurons to continue.
To be blunt, this is how Javascript has been for years, and those of us who understood the technology all along are now shaking our heads and asking "yeah, so?"
Re:It's not a flaw according to MS... (Score:2)
If you read up on it, you will realize it is not a flaw. There is no patch out there that is going to fix peoples stupidity, or that odd trust they have that everything on the interweb is safe.
People need to learn to be careful, and not give away information. By the Opera 8.01 is not vulnerable because they add a stupid bar that says where the popup came from..... wooo hooo what magical patch.
Re:It's not a flaw according to MS... (Score:2, Insightful)
What's wrong with that? It gives people information to help them figure out if they're being phished.
In comparison to Opera's new behavior, IE *is* flawed. I don't see why Microsoft thinks it shouldn't innovate this feature from Opera into IE.
Re:It's not a flaw according to MS... (Score:2)
There is a simple work-around for these phishing exploits: never trust pop-ups - assuming they were not disabled in the first place. When in doubt, proceed through the official front-page.
Ahh I love Javascript dialogs, I really do (Score:5, Insightful)
The only way out of them is to kill your browser process outright.
This is a prime opportunity for mozilla developers to do a slight tweak to the prompts. a "kill all javscript for the rest of this session" button, etc.
It seems to have been forgotten, or deferred.
Re:Ahh I love Javascript dialogs, I really do (Score:2)
Re:Ahh I love Javascript dialogs, I really do (Score:3, Insightful)
> prompts. a "kill all javscript for the rest of this session" button, etc.
I mentioned this last year, and was told to turn off javascript. I installed PrefBar to make this process easier (F8, click, F8) but then it's turned off until you turn it back on again. I need it on for some sites. What would be better would be an AdBlock style whitelist of sites where you need it enabled, so it can be disabled for the rest. It co
Re:Ahh I love Javascript dialogs, I really do (Score:5, Informative)
Ewan
NoScript (Score:2)
Thanks for posting the link!
Re:Ahh I love Javascript dialogs, I really do (Score:2)
Oh I know (Score:2)
That'll solve the problem
Excuse me?
What do you mean Java Scripting is a feature?
Re:Oh I know (Score:5, Informative)
Re:Oh I know (Score:2)
Re:Oh I know (Score:2)
sure as hell alleviates the symptoms for the semi-tech-minded though !
Re:Oh I know (Score:2)
I'm finding most of the javascript in tech sites at least is advertising scripts - copying banner ads, flash layovers, text ads and popups from other domains.
I already run AdBlock so I don't see them, but actually NoScript is doing most of the work AdBlock does anyway.... it makes a pretty good adblocking client as well.
Ooh (Score:2)
NoScript (Score:2, Informative)
Re:NoScript (Score:2)
Re:NoScript (Score:2)
I can't wait until this is worked out so I can use this extension...
disable javascript multitasking (Score:2, Interesting)
Phishing it for all it's worth (Score:5, Interesting)
It cracks me up, because they probably have an obsessive/compulsive, socially-maligned programmer within Secunia that just delights spending 16 hours a day trying to twist the browsers into doing what he wants. And then Secunia announces these flaws to save their reputation because nothing else is going on.
The value of red teaming (Score:3, Insightful)
I'm sure you are absolutely right. And hopefully he'll keep doing it because you there are crackers, phishers, and criminals out there who delight in spending 16 hours a day trying to twist browsers i
Not really the popups (Score:5, Insightful)
It corresponds to say.. running a browser, a spreadheet and say a game at same time and then getting a dialog box that is not identifiable saying "Do you want to save?".
Different problems of this sort will only raise as more and more applications are run as web based. Today it is popups that are not identified, tomorrow something else.
Front door... (Score:5, Funny)
Doors from major outlets, including those of Lowe's and Home Depot, are affected by this flaw. Our investigations have determined that this flaw has been known for years, yet the major distributors have not plans to release an update to correct the problem.
US Senator, C. Ritter has introduce legislation under the title "Omnibus Weak Nutz United", the OWN-U bill, that seeks to station a security agent to watch over every door in the case the occupants cannot determine that they are being conned.
Is this really a vulnerability? (Score:2, Insightful)
Odd (Score:4, Interesting)
http://secunia.com/multiple_browsers_dialog_origi
I've never understood the reason to link to ZDnet first. Especially when we are all a technical crowd and can deduce the severity on our own.
In my own opinion, the security community has been really scrambling to find exploits and vulnerabilities since the release of Windows XP SP2, which, despite a lot of compatibility issues with common software, has been very effective in slowing down the growth of zombie networks. In short, Microsoft finally got something right, and those that are in IT security for the sole reason of bashing MS to make a buck, are having a hard time doing so.
This is a phising technique that can be used to get a username/password from like a credit card or bank website, but that's about it. You'd be hard pressed to get this to compromise a local machine, although I'm interested in what would happen if someone tried calling a local zone page (like a help file) and then executing the javascript from that page. There was a similar exploit that used this delayed tactic last year that Microsoft didn't fix for probably 3 months. It was a 0-day exploit too, it was found in the wild, spreading via IRC, before anyone reported the vulnerability.
Re:Odd (Score:2)
Microsoft hasn't fixed the underlying problem, which is that a web browser or a component used by a web browser has no business providing a mechanism by which a web page can even request the execution of a downloaded native-code applet or scripts with local file access. That capability should not even be in the HTML display control.
That way i
Re:Odd (Score:2)
As far as the computer is concerned, the Javascript is executing in the context of the malicious page, and whatever security applies to that page applies to the Javascript. The idea you have is a non-issue.
The vulnerability being discussed is that it's not clear to the user that the popup that executes is from the malicious page. You can't use this t
Huh... (Score:2)
Stop Firefox or Mozilla from hiding location (Score:5, Informative)
Open about:config [about]. You'll probably have to type that, Mozilla won't follow it from an http: URL.
Key in dom.disable_window_open_feature as a filter.
Change the value for location to true. In Firefox, just double-click the false and it will toggle. Mozilla you need to edit it and actually type in all four letters of true. (But I'm happier with the Mozilla suite at the office, so I live with it.)
Change any other values to true that you feel like; I'd be inclined to do status, resizable, close and menubar at a minimum.
Now the location will be visible in any pop-up window.
So the very first thing the Moz group should do is default some of this stuff to true instead of pander to controlling webmasters who want to take over the user's computer. I mean false.
Re:Stop Firefox or Mozilla from hiding location (Score:3, Informative)
For goodness sakes, the referenced article even had a test you could run on your own. You would have seen first-hand that your idea, while correct, doesn't address this problem at all.
that's dumb (Score:2)
mod +1 next story please
Give JavaScript a Break (Score:2, Informative)
Nope, not a problem in my FireFox.. (Score:3, Insightful)
On another note, when will sites stop relying on freaking popup windows. Besided being blocked by many normal people, they are a real pain and always seem to have bugs associated with them. If you can't design your website to a full browser window, you shouldn't be designing websites!
captain obvious (Score:2)
They sure do!
Konqueror is also affected (Score:4, Informative)
Re:Konqueror is also affected (Score:4, Informative)
Not a probem with OS X (Aqua) (Score:3, Informative)
A new window is a new window and opens below (if there's room) and to the right (if there's room) of the requesting object window regardless of the amount of gadgetry on it (like title bars, buttons, window styles.)
Its always possible to fool somebody and they'll possibly be fooled into revealing their personal data, but eventually the problem will take care of itself hen these people and bust-ass broke and smothered in spam.
There's only so much people can do with a stateless environment. This would be a problem regardless of the language used (both computing & human), the browser used or the platform used (both hardware & software.)
At some point, people will realize this and stop trying to do the impossible.
Transactions are 'transactions'. That means that they have a 'commit point,' which means that they need a state engine which runs from the beginning of the process to the end of the process.
And yes, it CAN be done over the internet over a secure connection. But the control has to shift to the transaction machine while the transaction is going on. Neither you or anyone else should never be able to spawn a new GUI window while the transaction is happening.
Lynx Rocks! (Score:2, Funny)
even if they did, it wouldn't help (Score:2)
I can assure you that even if they did contain their origin, it would still not make much of a difference--most users wouldn't bother to look.
Maybe what we need is a secure web standard, something that runs only over https, uses strict XHTML, dispenses with JavaScript, pop-ups, frames, and popups, and is used for banking and similar applications. Preferably, that should be a separate browser.
Connect the Dots (Score:4, Interesting)
Doesn't anyone actually read the article? (Score:3, Informative)
"Once these things are discovered, there's a rush as everyone tries to fix the problem," Christen Krogh, Opera's vice president of engineering said.
Krogh also pointed out that Secunia had rated the vulnerability as "less critical."
"This could fool some users into giving out some data to a site that wouldn't otherwise be able to get that information. But it doesn't seem like the most important issue," Krogh said.
So what does this tell us?
- The folks somehow blaming Opera for this announcement obviously didn't read past the first couple of paragraphs of this very short article.
- The folks who are saying "JavaScript is bad" obviously didn't read... okay I'm sure they just saw the word "JavaScript" and went off from there anyway. Hey, guys, enjoy your static black text on white background pages - and we'll see you in the unemployment line. Any ideas on how to manipulate the DOM without JavaScript?
- While I agree MS shouldn't blow this off, they're probably still busy patching some of those more critical problems [eeye.com].
- Once again, end user education is probably the answer.
Re:old news (Score:5, Interesting)
It's advertising and FUD from those Opera guys. They are really getting boring.
- Opera adds a feature that shows the name of the site in the title bar in their last build
- Someone at Opera reports it (under a false name) as a security issue affecting every browser BUT Opera
- Slashdot runs one more article about the genious of this stupid paid-for, closed source browser.
That's not the first time it happens, nor the last one.
Re:old news (Score:5, Informative)
Ah, the evil Opera! I get it.
Asa? Is that you? Why are you posting as an AC?!Re:old news (Score:5, Insightful)
Currently, if you're popup blocking for all but trusted sites you should be relatively safe from this. It really is hard to prevent phishing attacks though. They attack the users judgement, which unfortunately tends to be the weakest link.
Re:old news (Score:3, Funny)
Re:people have to be really stupid (Score:3, Insightful)
Re:Safari (Score:3, Funny)
That's what happens when one doubts the infallible wisdom of Steve...
Re:Safari (Score:2)
Indeed, considering this problem affects so many different bro
Re:Safari (Score:3, Interesting)
Re:Safari (Score:3, Insightful)
While Cocoa does not yet use the garbage collection facilities of Objective-C, the GNU runtime does offer them.
But in short, this b
Re:Safari (Score:5, Interesting)
b) You can certainly use unsafe C contructs in ObjC, but ObjC provides (and encourages) safe, non-C constructs that address the vast majority of C problems. Unsafe pointer and buffer operations are rare in ObjC, because the language provides better alternatives.
c) "Many cases slower than Java" is the sort of unsupportable bullshit that people make when they're trolling. Yes, message passing is slower than virtual function calls (and Javas are [much,much] slower than C++s vcalls).
Re:Safari (Score:2)
Re:Safari (Score:2)
Re:Let's see... (Score:2, Troll)
Firefox has been working on it and Opera fixed it. Microsoft says they aren't going to fix it [com.com] since it is a "feature". Even better, Microsoft's answer [microsoft.com] is for users to install XP SP2 and make sure the firewall is enabled. Beautiful...
Re:Is Konqueror affected? (Score:2)
Re:If someone is foolish enough to log in via pop- (Score:3, Interesting)
You really think most people end up on malicious sites intentionally?
Re:If someone is foolish enough to log in via pop- (Score:3, Insightful)
You are forgetting that the normal way in which browsers have presented HTTP authentication for years is in a popup window. I'd expect many people to have logged into legitimate sites with what appears to be a popup to them.
What's a "malicious site"? There have been worms and viruses that insert malicious code into whatever HTML they can access. Suddenly, the definition of "malicious site" includes the website of every organis
Re:If someone is foolish enough to log in via pop- (Score:2)
If someone is foolish enough... (Score:3, Informative)
Re:stop developing with JavaScript (Score:2)
when is microsoft going to patch their OS so it no longer runs any code?
Re:stop developing with JavaScript (Score:2)
Re:stop developing with JavaScript (Score:2)
Re:stop developing with JavaScript (Score:5, Interesting)
Poppycock. This is nothing more than a typical knee-jerk reaction to a minor security flaw. Should we all stop using email because phisers can craft ones that look like someone elses?
Lots of sites use JavaScript very effectively. So many in fact, that it's rather difficult to make such a wild statement as "JAvascript is nothing but trouble." Google is a perfect example of a highly useful site with JS. For example, Maps and GMail both rely heavily on JS. In fact, most webmail sites contain JS. And without JS, you couldn't have neat stuff like this [c3.cx]. (Login is test, test)
Re:stop developing with JavaScript (Score:2)
Re:stop developing with JavaScript (Score:5, Insightful)
I agree that Javascript should not nessicarily be required to view content on a general website but properly used it gives a whole new dimension to web apps.
People give the guns and P2P analogy all the time here: they both have proper uses and improper uses and banning them, or not using them because they have improper uses makes no sense. How is Javascript any different?
Re:stop developing with JavaScript (Score:2)
People should stop developing with JavaScript. How many of us have it disabled in our browsers? It's nothing but trouble.
I'd change that to: "People should stop creating websites that require JavaScript unnecessarily." Unless your application really relies on JavaScript (eg. GMail, etc) your web-app should degrade gracefully on browsers that either don't support JavaScript or where the users have exercised their right to switch the bloody thing off.
Re:stop developing with JavaScript (Score:2)
What features of GMail really rely upon Javascript? Labels? No. Search? No. 2GB space? No. I can't think of any reason why GMail should require Javascript. People turn a blind eye because Google are so popular, but Javascript isn't exactly their strong suit. GMail could degrade gracefully, but they didn't bother.
Re:stop developing with JavaScript (Score:2)
No problem logging into gmail from Firefox with JavaScript disabled, just a "For a better Gmail experience, use a fully supported browser" blurb at the top, and fonts were different than usual.
Re:stop developing with JavaScript (Score:2)
Wow! What a well thought out idea! Let's take it to the next level...
People should also stop using IE. It's proven to be full of security holes. But of course this is largely due to it's integration w/the underlying OS, so people should probablty also stop using Windows.
For that matter, the problems are all found in the same place: On the Intenet, so people should just stop using
Re:stop developing with JavaScript (Score:3, Interesting)
Only the most paranoid of geeks, buddy. Average Joe has no idea what Javascript is. Hell, I was and currently am a part time web developer, and I'm not afraid of Javascript.
Re:iCab?!?! (Score:2)
iCab recently passed the second Acid test [webstandards.org].
Re:It's a Buggy Life (Score:2)
How is this a flaw?
Has the person who is describing the flaw even tried a POC?
Even if it were a flaw, do you really think people are going to notice the URL? Half the people I deal with on a regular basis don't even know what a URL is!
Re:It's a Buggy Life (Score:2)
Re:Nice try, Opera... (Score:2, Funny)
Re:Nice try, Opera... (Score:2)
Re:Nice try, Opera... (Score:2)
And you should probably see someone about that whole 'not being able to resist advertising' thing.
Re:Apple Bets Farm on Heterosexual Computing - GNA (Score:2)