Feeds

New XSS vuln hits eBay as rubbish passw0rds persist

Tat bazaars own password rules don't apply when users pick new sekrit w0rdz

Using blade systems to cut costs and sharpen efficiencies

eBay punters rushing to secure accounts could be selecting the world's worst passwords after the online tat bazaar was found accepting the most common and weakest passwords in contravention to its stated policy.

eBay has been slowly asking its users to reset account passwords after it admitted last week that unknown criminals made off with names, dates of birth, addresses, and proprietary hashed passwords.

It did not reveal the number of inactive accounts compromised and said hackers did not nab financial data nor pivot to PayPal after they broke in using staff credentials in late Feburary.

Crypto bod and co-founder of the TrueCrypt audit project Kenn White pointed out on Twitter that the bazaar accepted the world's most commonly used and low-entropy passwords while red-flagging and limiting stronger codes.

This writer has confirmed eBay accepted the most commonly used password as revealed in 2012 during its user password reset process. It also permitted those combinations explicitly marked unacceptable by eBay.

Screengrab by Kenn White

eBay's borked password system flagged high entropy (randomness) passwords generated by LastPass as weak, elevating more risky and common passwords as stronger options.

The system did not however allow users to enter passwords shorter than six characters (nor longer than 20) or those without an albeit weak number, letter or special symbol combination.

Researchers also reported and posted details on vulnerabilities within eBay web assets. Jordan Lee Jones (@CEHSecurity) reported an exploit developed in the MetaSploit security tool which allowed him to upload a shell via an eBay flash upload page.

An email from the British researcher to eBay security staff indicated the shell has been removed) and the vulnerability patched.

He also reported a cross site-scripting (XSS) vulnerbility in eBay's labs page which remained offline at the time of writing.

German researcher Michael E reported to Hacker News a separate and unpatched XSS in eBay which could allow attackers to create auction pages with unauthorised Javascript that could launch a payload to steal users' cookies. Ebay reused the cookies across sessions regardless of whether the victim logged out their account or reset passwords.

The vulnerabilities come as eBay took flak over its slow password reset procedure under which some affected users were only now receiving emails urging them to change their passwords.

The company could face fines of up to £500,000 from the Information Commissioner's Office. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.