Feeds

Security vuln in NTL spam

Cross-site scripting exploit

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Spam email recently sent out on behalf of NTL pointed to a potentially serious vulnerability in the cable operator's online processing system.

Although NTL acted quickly to shore up the potential problem it serves as yet another example of why spam messages can damage an organisation's brand.

The offending message was sent to Matthew Garrett, of Cambridge University's Computer Laboratory, via a third party but pointing to a seemingly legitimate NTL offer.

"I wasn't terribly amused by this, but checked the Web site to see whether it did seem legitimate," Garrett explains. "While there, I noticed that there seemed to be a large amount of English embedded in the URL, which also appeared in the text of the page."

Garrett discovered that extra HTML tags could be inserted into the URL, and worse, this extra information was passed through the link to a supposedly secure ordering page.

Oh dear.

"With the aid of Steven Murdoch, a member of Ross Anderson's security group here in Cambridge, we constructed a cross-site scripting exploit that could be embedded in the original url," Garrett explained.

"Normally this sort of attack can be used to obtain user's cookies, but since a page taking credit card numbers was involved this time it also allows for a hostile user to cause the credit card numbers (along with all the other personal information) to be sent to a site somewhere else."

Oops. Again.

The researchers created a proof of concept code to prove that the vulnerability could be maliciously exploited using JavaScript embedded in an obfuscated url sent to potential victims.

"Instead of popping up boxes, the JavaScript could wait until you click on the submit button and send your credit card number, address, phone number and all off to Johnny Badman's hacked server somewhere in Russia."

But would people visit this URL?

"NTL have already demonstrated that at least one of their advertising contractors is happy to spam people, so it'd look just as legitimate," Garrett argues.

Just as well that NTL has now fixed these security vulnerabilities. Let's hope it stops paying third parties to spam people too.

NTL told Garrett that it had asked a third party to check that the addresses were opt-in, but that about 50 per cent of the addresses they were told were clean were in fact trawled from Usenet and the like.

NTL scripting errors serve as an example for other organisations. So what lessons can we learn?

The real issue, according to Garrett, is "taking information from a URL and embedding it in a page - it's pretty much impossible to do this without letting people insert HTML tags that let them embed scripts from other websites (for instance) which subvert the page functionality. If the page is collecting credit card numbers, then the consequences are fairly obvious."

"Website authors need to be more paranoid," he argues.

"There are people who are sufficiently competent to work out how to pass variables to you scripts, even if you don't think that it's likely. Doing this with a site that accepts credit cards is a desperately bad idea, but it can be used for attacks in any case.

"There should be no excuse for making this sort of mistake."

The use of spam to tempt people to a poorly constructed Web site only makes matters worse.

As Garrett notes: "Spamming sufficiently competent people is likely to piss them off enough to subvert your website." ®

Related Stories

NTL working on 'intermittent' email problem
NTL in alleged hack probe
FBI names 20 most unwanted security flaws

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.