A vulnerability that
would have enabled a hacker to completely bypass the authentication
system in PayPal has been patched, resulting in a $10,000 bounty for the
white-hat that found it. Worth every penny, too: the flaw put 150 million PayPal customers
in danger of having their accounts hijacked with a low-effort, simple gambit.
The flaw was publicly disclosed by Egyptian researcher Yasser
Ali, after he saw that the cross-site request forgery (CSRF) Prevention
System implemented by PayPal had a critical flaw. The CSRF token for
authorization of users is changed with every request made by a user as a
security precaution. But, Ali found that the ‘CSRF Auth’ token is
reusable for a specific user email address or username, meaning that a
hacker could intercept and take possession of the tokens, and then
simply reuse them to access the account of the correlated, logged in
user.
Ali detailed how the vulnerability could be exploited, in a blog.
The essential problem lies with the fact that CSRF Auth verifies every
single request of that user. So, if an attacker is not logged in and
tries to make a 'send money' request then PayPal will ask the attacker
to provide his email and password. When he plugs in an email and any
type of password, valid or not, he can then capture the request, which
will contain a valid CSRF Auth token, which is reusable and can
authorize this specific user requests.
From there, the next hurdle is to get past the security
questions, since an attacker cannot change the victim’s password without
answering them. This boiled down to the fact that the initial process
of setting security questions in the first place is not
password-protected and is reusable, so it can simply be initiated to
reset the security questions, without providing the password at all.
Taken in total, an attacker can conduct a targeted CSRF attack
against a PayPal user and take a full control over his or her account.
This involves requests including: Add/remove/confirm email address; add
fully privileged users to business account; change security questions;
change billing/shipping address; change payment methods; change user
settings (notifications/mobile settings).
Given the level of havoc that the exploited flaw could wreak,
it’s no wonder that “the vulnerability is patched very fast and PayPal
paid me the maximum bounty they give ;),” Ali said.
PayPal itself offered some feedback to Infosecurity: “One of
our security researchers recently made us aware of a potential way to
bypass PayPal's Cross-Site Request Forgery (CSRF) Protection
Authorization System when logging onto PayPal.com.
Through the PayPal Bug Bounty program, the researcher reported this to
us first and our team worked quickly to fix this potential vulnerability
before any of our customers were affected by this issue. We
proactively work with security researchers to learn about and stay ahead
of potential threats because the security of our customers’ accounts is
our top concern."
Obviously, PayPal users should update their applications immediately.
Culled from:
Information Security Magazine
1 comment:
Wow, Excellent post. This article is really very interesting and effective. I think its must be helpful for us. Thanks for sharing your informative.
social exchange sites
earn money online
social bookmarking sites list
directory submission site list
article submission sites
blog commenting sites
forum posting sites
press release sites list
outsourcing
off page seo
seo tutorial
free seo tools
freelancing
freelancing sites
seo
Post a Comment