Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity

    Cookie Holes Expose Browsers

    Written by

    Matt Hines
    Published January 31, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security researcher Michal Zalewski has identified an issue related to the manner in which most Web browsers process so-called cookies that he contends may leave many Web sites open to malicious attacks.

      Zalewski, best known as the author of security tome “Silence on the Wire,” has labeled his discovery “cross-site cooking” and claims that the problem is based on some of the primary design elements used to create and employ HTTP cookies.

      Cookies are pieces of text-only string code entered into a browsers memory by a Web site, used in many cases to allow the applications to retain user data such as personal identification and password information.

      According to Zalewski, who is currently based in Poland but worked previously for security firm BindView, three separate flaws related to cookie generation and retention make it “alarmingly easy” for malicious sites to load spoofed information onto the browsers of unsuspecting users via legitimate third-party Web servers.

      On a post to the BugTraq mailing list for security researchers, Zalewski outlined the cookie problems and also indicated his belief that the issues were reported publicly as long ago as 1998, while noting that apparently nothing has been to remedy the situation.

      “There is no immediate universal threat to life as we know it, but numerous Web scripts are an easy target of specific variants of the attacks,” Zalewski wrote.

      “On sites where authentication data is tied on a server to a session ID, the attacker may be able to acquire credentials by tricking the visitor to authenticate within a session initiated by the attacker.”

      Specifically, the researcher said one of the issues is tied to the process through which cookies are issued by sites, which was originally designed to help browsers reject cookies that are set up for Web domains that may be defined too broadly, or which do not match the location of the site generating the data.

      Typically, when a new cookie is issued to a browser, the Web server processing the information specifies the domain and location with which the cookies data is associated.

      Zalewski said the mechanism used to prevent people from creating cookies with “overly relaxed domain specification” appears to be broken in all the major commercial Web browsers.

      /zimages/6/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      While the rule in question specifies that a particular number of periods, or dots, must be used in the top-level domain names of most Web site addresses to prevent subdomain names from being changed to something different, the researcher said this feature can be easily bypassed in browsers such as Microsofts Internet Explorer and Mozilla Foundations Firefox.

      Representatives from Microsoft and Mozilla didnt immediately return calls seeking comment on Zalewskis findings.

      Once bypassed, Zalewski said, the cookie identification flaw could be used to “override or corrupt credentials or other parameters on hundreds of thousands of e-commerce Web sites,” potentially allowing someone to remotely plant user information on another persons computer and steal credentials when that person logs onto a site. Sites bearing international domain names may be at even greater risk for attack, Zalewski said.

      Zalewski said the only way to solve the issue may be to make changes to the basic format used to create HTTP cookies, but he advised that browsers may be protected against such attacks if they are programmed to recognize top-level domains that could be targeted by such activity.

      Another related cookie issue highlighted in the posting was the finding that some browsers, including Explorer and Firefox, do not actively scan to see if additional information has been placed between the periods used in the domain name listed by a particular cookie.

      /zimages/6/28571.gifMozilla downplays an exploit found in Firefox 1.5. Click here to read more.

      This problem could allow someone to unwittingly redirect a user to a different site, Zalewski said, potentially one that has been spoofed to appear just like the Web page the user believed he or she was requesting.

      The second cookie issue he mentioned was a problem specifically documented for browser makers as far back as 1998 by another researcher named Benjamin Franz, Zalewski said.

      The third flaw Zalewski reported involves a method which could be used by an attacker to force site visitors to unwittingly accept and relay cookies to a third-party site.

      While it is believed that this would not compromise peoples settings the next time they visited the site that held the affected cookie, Zalewski said the method could be used immediately to change a users identity and attack the site in question.

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.