[security] Phishing issues with return_to url and realm
Johnny Bufu
johnny at sxip.com
Thu Feb 8 07:16:36 UTC 2007
On 7-Feb-07, at 10:20 PM, Allen Tom wrote:
> Having the OP follow all the redirects returned by the return_to
> all the way to the end, and presenting the final url to the user
> might seem to be an improvement, however, the evil RP could just be
> one of many intermediate servers, which would enable all sorts of
> interesting man in the middle type attacks.
>
> so for instance:
>
> return_to=go.com/redirect?1,2,http://evilsite.com/
> redirect?....good.isp.com
>
> If the OP just followed redirects to the end of return_to url, and
> then matched it up with the realm, the evil RP could claim to be
> absolutely anything that it wants to be, since the evil RP could
> just be the redirect server, and the claimed site would just be at
> the end.
>
> evilsite.com would be able grab a positive Auth Response and play
> it to good.isp.com in a Stateless type request. EvilSite.com could
> even behave nicely when the OP is probing it (perhaps by
> recognizing the OP's IP address or User Agent).
This kind of playback is prevented by the return_to URL verification:
when goodisp.com verifies the response, it will fail because either
the return_to URL doesn't match with what it is expecting, or the
signature doesn't match (if evilsite.com modified the return_to in
the response).
I'm still not sure I understood the full attack vector from beginning
to end - what is evilsite.com trying to accomplish by fooling the
user/OP with redirects? If you could describe a step-by-step scenario
it would greatly help (me at least) to understand what needs to be
fixed.
Johnny
More information about the security
mailing list