Feeds

Interweb Chuck Norris infiltrates Netflix, Tivo

CSRF has two speeds: Hack and Kill

Providing a secure and efficient Helpdesk

Researcher Lance James has been busy devising ways to play tricks on some of the world's bigger websites using an exotic attack known as CSRF, or cross site request forgery. While his exploits amount to little more than pranks, they point to the very sobering realization that the net isn't a very secure place.

One proof-of-concept attack targets users of Hulu.com. Clicking on it while logged in to the online provider of TV shows causes Fox Network's Family Guy to be added as a subscription and the documentary Air Force One to be put in the queue. This happens behind the scenes.

Similarly, readers who click here while logged in to Netflix will find the movie Sneakers added to their queue without ever being asked for permission. The link never actually displays a Netflix page, so it's likely users will have no idea the addition has been made until the DVD shows up in their mailbox.

"I can probably figure out how to make you buy my book without realizing it," says James, who is a researcher at Secure Science Corp and the author of Phishing Exposed. (A demonstration of just that attack is available here). "It's kind of like a magic trick when you can do things to people's computers underneath."

James likens CSRF attacks to the oft-repeated tactic used in Chuck Norris movies, where the protagonist breaches his enemy's well-fortified compound by hiding himself under the chassis of a trusted vehicle as it enters. In much the same way, CSRFs are able to trick websites into executing unauthorized commands by exploiting the trust they have for the user.

(Also referred to as session riding and one-click attacks, CSRFs are not to be confused with XSS, or cross-site scripting attacks, in which an attacker injects hostile code and content into a trusted website).

James says sites including MySpace, Twitter, and Google have gone to great lengths to prevent CSRF attacks on their properties, often by requiring users to re-enter passwords before making sensitive changes. But plenty of sites see such safeguards as a potential annoyance to their users and forgo them. And so, he says, it's not hard to spot CSRF vulnerabilities of some of the web's most popular sites.

While the three proofs-of-concept demonstrate relatively innocuous attacks, this does not have to be the case. For anyone logged in to Tivo.com, the link here will silently change the email address associated with the account with no warning at all. (Be sure to change it back if you clicked on it while logged in). An attacker could exploit this weakness in a two-step attack that changes the email address and then uses it to reset the account password.

Plenty of other websites have been bitten by the CSRF bug, including Google, which in September 2007 was found to suffer from a vulnerability that could be used to steal user pictures stored using its Picasa photo organizer.

But even fairly innocuous exploits such as those that add a movie to a user's Netflix queue may have unexpected consequences, given that websites of its size often sell anonymized user selections to marketers.

"If that stuff becomes inaccurate or untrustworthy, the value of the product to Netflix actually goes down," James says. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.