Feeds

Interweb Chuck Norris infiltrates Netflix, Tivo

CSRF has two speeds: Hack and Kill

5 things you didn’t know about cloud backup

Researcher Lance James has been busy devising ways to play tricks on some of the world's bigger websites using an exotic attack known as CSRF, or cross site request forgery. While his exploits amount to little more than pranks, they point to the very sobering realization that the net isn't a very secure place.

One proof-of-concept attack targets users of Hulu.com. Clicking on it while logged in to the online provider of TV shows causes Fox Network's Family Guy to be added as a subscription and the documentary Air Force One to be put in the queue. This happens behind the scenes.

Similarly, readers who click here while logged in to Netflix will find the movie Sneakers added to their queue without ever being asked for permission. The link never actually displays a Netflix page, so it's likely users will have no idea the addition has been made until the DVD shows up in their mailbox.

"I can probably figure out how to make you buy my book without realizing it," says James, who is a researcher at Secure Science Corp and the author of Phishing Exposed. (A demonstration of just that attack is available here). "It's kind of like a magic trick when you can do things to people's computers underneath."

James likens CSRF attacks to the oft-repeated tactic used in Chuck Norris movies, where the protagonist breaches his enemy's well-fortified compound by hiding himself under the chassis of a trusted vehicle as it enters. In much the same way, CSRFs are able to trick websites into executing unauthorized commands by exploiting the trust they have for the user.

(Also referred to as session riding and one-click attacks, CSRFs are not to be confused with XSS, or cross-site scripting attacks, in which an attacker injects hostile code and content into a trusted website).

James says sites including MySpace, Twitter, and Google have gone to great lengths to prevent CSRF attacks on their properties, often by requiring users to re-enter passwords before making sensitive changes. But plenty of sites see such safeguards as a potential annoyance to their users and forgo them. And so, he says, it's not hard to spot CSRF vulnerabilities of some of the web's most popular sites.

While the three proofs-of-concept demonstrate relatively innocuous attacks, this does not have to be the case. For anyone logged in to Tivo.com, the link here will silently change the email address associated with the account with no warning at all. (Be sure to change it back if you clicked on it while logged in). An attacker could exploit this weakness in a two-step attack that changes the email address and then uses it to reset the account password.

Plenty of other websites have been bitten by the CSRF bug, including Google, which in September 2007 was found to suffer from a vulnerability that could be used to steal user pictures stored using its Picasa photo organizer.

But even fairly innocuous exploits such as those that add a movie to a user's Netflix queue may have unexpected consequences, given that websites of its size often sell anonymized user selections to marketers.

"If that stuff becomes inaccurate or untrustworthy, the value of the product to Netflix actually goes down," James says. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.