Simon Willison’s Weblog

Subscribe
Atom feed for security

499 items tagged “security”

2007

Safari Beta 3.0.1 for Windows. A nice fast turnaround on fixes for security flaws in the beta.

# 14th June 2007, 9:56 am / security, safari, apple, patch

Safari for Windows, 0day exploit in 2 hours (via) Once again, down to handling of alternative URL protocol schemes.

# 12th June 2007, 1:30 pm / 0day, security, windows, safari, apple

Security Breach. A statement from Dreamhost.

# 8th June 2007, 8:16 am / security, dreamhost, hosting

Firefox promiscuous IFRAME access bug. Lets malicious sites “display disruptive or misleading contents in the context of an attacked site” and intercept keystrokes! The demo worked in Camino 1.5 as well. Avoid using Gecko-based browsers until this is patched?

# 6th June 2007, 10 am / michal-zalewski, camino, firefox, security, iframes

Gaping holes exposed in fully-patched IE 7, Firefox (via) Michal Zalewski released a new Firefox 2.0 vulnerability in addition to the IE cookie stealing one.

# 6th June 2007, 9:57 am / firefox, ie, michal-zalewski, security

IE vulnerability allows cookie stealing. Full exploit against the same-domain cookie origin policy, so malicious sites can steal cookies from elsewhere. Avoid using IE until this is patched.

# 6th June 2007, 9:53 am / ie, security, samedomain, cookies

Massive Dreamhost hack, WordPress not to blame

On mezzoblue, Dave Shea reports that someone had modified every index.php and index.html file on his site to include spam links at the bottom of the page, hidden inside a <u style="display: none;">. Dozens of other people in his comments reported the same thing happening to their sites.

[... 279 words]

Unsettling. Sounds like there might be a massive scripted hack going on against out of date WordPress installs on Dreamhost. Check your site. See also discussion in the comments attached to this post.

# 5th June 2007, 9:16 pm / dave-shea, dreamhost, hosting, php, security, spam, wordpress

Top XSS exploits by PageRank. Yahoo!, MSN, Google, YouTube, MySpace, FaceBook all feature.

# 29th May 2007, 10:07 pm / yahoo, msn, google, youtube, facebook, xss, pagerank, security

XSSed. Cross-site scripting resource and vulnerabilities archive, including reported (unpatched) holes ordered by PageRank.

# 29th May 2007, 10:03 pm / xss, pagerank, security

The Twitter API Respects Your Privacy. Not Twitter’s fault: The users who exposed their data through Twittervision had given that site their username and password; Twittervision was failing to hide protected updates.

# 24th May 2007, 11:37 pm / twitter, security, twittervision

There’s a hole in your Twitter. If you’ve been using friends-only messages on Twitter they may currently be exposed via the API.

# 24th May 2007, 5:03 pm / twitter, security, megpickard

Introducing http:BL (via) Project Honey Pot announce a new blacklist service for blocking comment spammers and e-mail spiders using information from their network of honey pots.

# 25th April 2007, 11:39 pm / honeypot, security, commentspam, spam, blacklist

Most HTML templating languages are written incorrectly. “If you ever find yourself in the position of designing an html template language, please make the default behavior when including variables be to HTML-escape them.” I couldn’t agree more.

# 15th April 2007, 8:28 pm / xss, security, templating, daniel-martin

JSON and Browser Security. Douglas Crockford suggests using secret tokens to protect JSON content, and avoiding wrapper hacks to protect unauthorised JSON delivery as they may fall foul of undiscovered browser bugs in the future.

# 11th April 2007, 12:52 am / douglas-crockford, json, security

Fortify JavaScript Hijacking FUD. Bob Ippolito points out the flaws in the recent widely disseminated JavaScript Hijacking paper. While the paper does miss some important details, it’s good that more people are now aware of the security implications involved in serving JSON up wrapped in an array.

# 5th April 2007, 10:51 pm / json, bobippolito, javascript, security

Chris Shiflett: My Amazon Anniversary. Chris Shiflett discloses an unfixed CSRF vulnerability in Amazon’s 1-Click feature that lets an attacker add items to your shopping basket—after reporting the vulnerability to Amazon a year ago!

# 16th March 2007, 10:16 am / csrf, security, chris-shiflett, amazon

XSS. Sanitising HTML is an extremely hard problem. The sanitize helper that ships with Rails is completely broken; Jacques Distler provides a better alternative.

# 12th March 2007, 12:34 am / xss, security, rails, jacques-distler

Security; AJAX; JSON; Satisfaction. The JSON attack I linked to earlier only works against raw arrays, which technically aren’t valid JSON anyway.

# 6th March 2007, 8:06 am / json, security, xss

JSON is not as safe as people think it is. Joe Walker reminds us that even authenticated JSON served without a callback or variable assignment is vulnerable to CSRF in Firefox, thanks to that browser letting you redefine the Array constructor.

# 5th March 2007, 10:51 pm / joe-walker, json, csrf, security

PHP 4 phpinfo() XSS Vulnerability. Another reason not to run an open phpinfo() page on your server.

# 4th March 2007, 9:24 pm / php, phpinfo, xss, security

WordPress 2.1.1 dangerous, Upgrade to 2.1.2. Helping to spread the word. You’re affected if you’ve downloaded WordPress 2.1.1 in the last three or four days.

# 3rd March 2007, 8:06 am / security, wordpress

Safe JSON (via) Subtle but important point about JSON APIs: you shouldn’t use a callback or variable assignment for JSON incorporating private user data, especially if it’s at a predictable URL.

# 2nd March 2007, 1:11 pm / json, security

The Psychology of Security. I haven’t even started on this yet, but I bet it’s worth reading.

# 9th February 2007, 1:27 am / bruce-schneier, security, psychology

If you found a hole in software that millions of people use, and is very high profile, you can sell that to the highest bidder for perhaps one or two million dollars.

Jacques Erasmus

# 4th February 2007, 7:06 pm / bbcnews, hacking, security, blackmarket, exploits

Microsoft confirms Vista Speech Recognition remote execution flaw. “I have verified that I can create a sound file that can wake Vista speech recognition, open Windows Explorer, delete the documents folder, and then empty the trash.”

# 1st February 2007, 5:19 pm / funny, vista, security, speechrecognition, microsoft

MySpace Allegedly Kills Computer Security Website. No need for the allegedly; it’s been confirmed. MySpace got GoDaddy.com to redirect DNS for seclists.org after a list of phished user accounts posted to the full disclosure mailing list list was archived there.

# 26th January 2007, 9:57 am / myspace, dns, godaddy, security, phishing

Solving the OpenID phishing problem

Most of the arguments I hear against OpenID are based on mis-understandings of the specification, but there is one that can’t be ignored: OpenID is extremely vulnerable to phishing.

[... 531 words]

The NHL’s All-Star voting disaster. The NHL ran an online poll to decide which players are picked for their All-Star Game. The only authentication was a poorly implemented CAPTCHA. Unsurprisingly, it got gamed.

# 19th January 2007, 9:50 am / gaming, nhl, security, captcha, stupid

MySpace: Too Much of a Good Thing? CSS customization really was just the result of forgetting to strip HTML. They “eventually” decided to filter out JavaScript(!)

# 17th January 2007, 9:09 am / myspace, css, javascript, xss, security