[security] Unsolicited assertion security vulnerability?
Andrew Arnott
andrewarnott at gmail.com
Sat Oct 27 00:16:21 UTC 2012
OpenID 2.0 RPs that allow unsolicited assertions (which Just Works by
default for proper OpenID implementations, it seems to me) seem to be
vulnerable to an attack. Can anyone confirm or deny what I'm imagining
here? It seems a security advisory *may* be appropriate.
The attack:
1. Victim navigates the browser to the attacker's web site.
2. The web site hosts a hidden iframe that redirects to a popular RP the
user is suspected to have an account with, carrying an unsolicited
assertion to the attacker's identity.
3. The victim them navigates to the RP that previously received the
hidden, unsolicited assertion.
4. The victim, unaware of the authentication, assumes that he/she is
logged into their own account, and uses the RP under that assumption. They
may upload files or transmit other data.
5. The attacker, who controls the account the victim is logged into,
gains access to that transmitted data.
Mitigations:
1. Disable unsolicited assertions (perhaps by only accepting assertions
with a return_to that includes a signed nonce from the RP).
2. Accepted unsolicited assertions, but only after frame busting code
has confirmed with the user that they intended to log in as [attacker].
What are your thoughts on this?
--
Andrew Arnott
"I [may] not agree with what you have to say, but I'll defend to the death
your right to say it." - S. G. Tallentyre
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20121026/bb8ee08a/attachment.html>
More information about the security
mailing list