Steam Bug Allowed Password Resets Without Confirmation 62
An anonymous reader writes: Valve has fixed a bug in their account authentication system that allowed attackers to easily reset the password to a Steam account. When a Steam user forgets a password, he goes to an account recovery page and asks for a reset. The page then sends a short code to the email address registered with the account. The problem was that Steam wasn't actually checking the codes sent via email. Attackers could simply request a reset and then submit a blank field when prompted for the code. Valve says the bug was active from July 21-25. A number of accounts were compromised, including some prominent streamers and Dota 2 pros. Valve issued password resets to those accounts with "suspicious" changes over the past several days.
That's funny (Score:5, Funny)
That's pretty funny considering the NIGHTMARE I went through getting my steam account reset as the email account I used to register (DOH!) was a previous work email that is no longer active, so sending me an email asking if I want to change my email is pointless. And now I find out that if I had have waited, it wasn't even verifying the code?
FFS
Re: (Score:3, Informative)
The Half-Life wiki has a good article called Future of the Half-Life series [wikia.com] where you can follow the latest developments.
On March 19, Gabe Newell, when asked about Half-Life 3, replied: "The only reason we'd go back and do like a super classic kind of product is if a whole bunch of people just internally at Valve said they wanted to do it and had a reasonable explanation for why [they did]." This, like all of Valve's other statements regarding Half-Life 3, neither confirms nor denies the possibility that t
Re: (Score:2)
"WHY"? The most idiotic thing he could ask.
If you're in the game for the long haul then you don't just throw away your reputation. You make the game when it makes sense to make the game. You have some new level of competence to display, usually. That's when HL2 came out.
Re: (Score:2)
At this point, HL3 (or even just "HL2 episode 3") is going to become Valve's Daikatana or Duke Nukem Forever. Just following on from the end of Hl2e2 is going to be a huge hurdle (their writer must be at least this good in order to get on this ride) never mind whatever Source engine technology they want to show off.
I think that Newell sees only two possibilities: 1) they never make the game or 2) they make the game and everyone hates it.
Re: (Score:2)
Re: (Score:2)
If something like this slips through testing (Score:5, Insightful)
Then testing either sucks completely or ignores security functionality. This really is an absolute basic thing to test, just as testing that giving a wrong password does not give you access. The state of practical software engineering seems to still be abysmal, even after this problem has been known for a few decades. It is high time to legally bar amateurs from doing software that has any security functionality that protects customer assets and data.
Re: (Score:2)
Possibly. If the summary is correct, this would be abysmally bad. Although it seems the vulnerability was only there for a short time, and they possibly did not fix, but roll-back to get rid of it. Fixes take some time, roll-backs are almost instantaneous. Roll-backs can only be done for an not very old previous version though, so they likely had one that was still fine.
Re: (Score:2)
Probably a bad SQL query join that checked for the existence of a value. If you mistype a code it might be found. If you enter no code, there might be matches.
Re: (Score:2)
Re: (Score:2)
Seems a little silly to put the user input checking in db code instead of server code.
Re: (Score:2)
Re: (Score:2)
On the other hand, a check whether the result of the DB query matches an expected format is easy to do. Of course, real men do not verify assumptions. They just know.
Re: (Score:2)
Sounds very plausible.
Re:If something like this slips through testing (Score:5, Interesting)
The only thing more important than something working how I want it is for it to fail how I want it.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Indeed. Incidentally, a professional penetration-test does exactly that.
Re: (Score:1)
Valve doesn't have testers. They literally have zero testers. Developers are supposed to test their own code but many of the teams have zero automated tests. The 'contract' with the customers is basically that will Valve will ship cool stuff and the customers will forgive their mistakes.
This contract works okay for the games, mostly, but falls down pretty hard for Steam. Steam does have tests, but not really enough.
TL;DR Many Valve developers have a shocking disregard for code quality and failures like this
Continuous Deployment! (Score:1)
Re: (Score:2)
They tell you to ignore it too... (Score:1)
I got one of the password reset emails during this "attack". The email you receive specifically states:
If you are not trying to reset your Steam login credentials, please ignore this email. It is possible that another user entered their login information incorrectly.
Yep, if you didn't try to reset your password, ignore the fact that you got the password reset email.
Lucky me, apparently I enabled Steam Guard back in 2013.
Re: (Score:3)
I decided to change my password, and just to test things out I issues a password reset i
Re: (Score:2)
Come on now... (Score:2)
It's funny, though, because resetting the password on a STEAM account the way you're supposed to can be a total clusterfuck that will leave you cursing for days, if not weeks. Ask me how I know.
Re: (Score:2)
Ask me how I know.
How do you know?
Re: (Score:2)
How do you know?
I tried it once, and to put it succinctly, I'd rather have back-to-back root canals than go through that shite again.
Wait, what? (Score:2)
Really, Steam? Really? You really, truly didn't even bother to check the code you sent as "confirmation"? The code that is the raison d'être for sending the code in the first place?
This is the kind of mistake I'd expect from a newbie who's still getting the hang of "Hello, World!", not from a multi-million dollar team of professional developers.
Re: (Score:3)
I think it's more of a side-issue.
If there was a code in the box, it checked it. And refused incorrect codes.
But nobody tested it when there wasn't a code in the box.
Still pathetic, but a little less so.
Re: (Score:2)
Re: (Score:2)
If there was a code in the box, it checked it. And refused incorrect codes.
But nobody tested it when there wasn't a code in the box.
In what world is (null) not an invalid code? What color is the sky there?
Re: (Score:2)
You're missing the point (though the practical implications are the same).
The check on whether the code was valid was only run if the user typed a code into the box. Typing in random letters wouldn't validate. Typing in a valid code would.
It was an oversight that the checks existed but never actually took place in the case of null, not that they were not capable of validating codes.
As such, rather than just "Let's make up random codes and then ignore them and validate anything", the thought process was "L
Microsoft had something similar (Score:3)
Microsoft's Xbox Live system had something similar a few years ago. In that case, the "bug" was actually a flaw in their online and phone support protocols and is pretty well documented here.
This was used to compromise a large number of accounts in 2011 and 2012, with the compromised accounts generally being used to make tradeable FIFA DLC purchases, allowing Xbox Live purchases to be laundered back into real cash.
I got stung by it myself, which utterly shocked me as my XBL password was a strong password that had only ever been entered into my 360 console - so even if my PC were compromised (and I was pretty sure it wasn't), the password certainly hadn't been extracted via a keylogger. MS were very prompt in responding and gave the impression that they were dealing with a lot of these cases. They refunded the £50 that the scumbag had spent and gave me 3 months free XBL Gold subscription as well, which seemed odd given I was still convinced the slip-up must have been on my end.
Wasn't until I saw that Kotaku article a few months later that I realised what had happened. The irony is that this was going on at the same time as the Sony PSN breach and, unlike the PSN breach, it resulted in accounts actually being compromised and fraudulent purchases being made. But as it was a steady drip-drip-drip of compromised accounts rather than an eye-catching big-bang "hack", the mainstream media never picked up on it.
Re: (Score:2)
Dear Valve - please try Kaje Picture Passwords (Score:2)
"Dear Valve: Please go to http://ka.je/ [ka.je] to see a solution to your authentication problem. The Kaje Picture Password SAAS removes all passwords from your website, eliminates transmission of passwords across the net - they are converted to an encrypted hash in the browser - and prevents phishing attacks. The Kaje SAAS never knows anything about the user, so there is no way (short of hacking two different operating systems run by two different companies on completely separate networks, at least one of which