Welcome!

You will be redirected in 30 seconds or close now.

ColdFusion Authors: Yakov Fain, Jeremy Geelan, Maureen O'Gara, Nancy Y. Nee, Tad Anderson

Related Topics: ColdFusion, Machine Learning , Agile Computing

ColdFusion: Article

Did You Get the Web 2.0 Memo?

No, you did not miss the memo or a software upgrade notice, yet you've already arrived at Web 2.0

Web-Borne Malware
Web-borne malware exploits a blind spot in many security implementations. Specifically, many applications fail to inspect the data returned from a visit to an Internet Website. Typically using Java Script, malicious hackers literally append malicious code to the Internet Web page. When the unsuspecting user visits the infected Web page, the JavaScript runs in the user’s browser and in most cases causes malware (such as a key logger or root kit) to be downloaded to the user’s PC. This methodology has also been referred to as “Drive By Hacking” and has impacted several high-profile Websites. One prime example: at the peak of the NFL playoffs, hackers compromised the Miami Dolphins’ Website and malware was automatically loaded onto visitors’ PCs. Similarly, the Center for Disease Control Website was compromised, and unsuspecting visitors had malware loaded onto their PCs.

The most notable Web-borne malware event to date involved the storm worm and its respective spam botnet. Starting in January 2007, the storm worm has gone on to impact hundreds of thousands of users. The malware generated over 9 million e-mails to users. Each message directed recipients to Websites containing malicious code. While the social engineering aspects change regularly, the Web 2.0 / Web-borne malware delivery methodology remains the vehicle of choice for the delivery of its root kit / spam bot malware.

Still in Denial
Even today, Web server administrators irresponsibly dismiss Web-borne malware as non-malicious attacks, while thousands of their Website visitors are put at risk. An estimated 450,000 URLs point to malicious Websites hosting malware on the Internet. That’s nearly half-a-million hidden landmines that casual users and even advanced users can’t spot on their own.

RSS / ATOM Feeds
Nearly 12% of Internet-connected users take advantage of RSS / Atom feeds to receive timely news and data content. Alas, most users don’t consider the security ramifications of connecting to a remote server for an RSS / Atom feed. To be sure, using RSS to deliver malware is well within the realm of possibilities.

The RSS threats aren’t new. As far back as 1995, Yahoo was alerted to an RSS feed vulnerability in the company’s RSS aggregator. A more recent security issue has been found with the AOL ICQ Toolbar (CVE-2006-4660). In this example, the default options2.html Web page is not validated before loading. This permits a hacker to execute arbitrary script / coding by tricking them into visiting a malicious Website. A second vulnerability in AOL ICQ Toolbar (CVE-2006-4661) takes advantage of a failure to validate the title and description fields of the feed. This sets the stage for a hacker to trick a user into visiting a malicious Web site to execute arbitrary HTML / scripting.

XSS Scripting
XSS allows malicious hackers to inject code into the Web pages viewed by others. This methodology has become popular in Web 2.0 phishing exploits and browser vulnerabilities. In some cases, it allows the hacker to bypass access controls within the user’s network

There have been several XSS exploits on the Internet and two received a great deal of media attention:

  • MySpace XSS Worm: A worm written to exploit an XSS vulnerability in MySpace brought the service down for nearly two days. The exploit injected JavaScript into users’ pages and when the Web page was visited, the JavaScript was executed in the visitors’ browsers.

  • Yahoo XSS: XSS vulnerability in Yahoo tricked users to click on a booby-trapped link. After each user clicked on the link, the hacker gained access to the user’s Yahoo account including e-mail, address book, and calendar entries.

It should also be noted that a security researcher recently uncovered 40 flaws in Google’s YouTube Website. The vast majority of these flaws were XSS issues that put users at risk of having their profiles infected with a fast-spreading worm that could potentially steal users’ credentials.

Cross-Site Request Forgeries (CSRF)
CSRF is often confused with XSS exploits. However, CSRF does not rely on any client-side active scripting. Instead, CSRF exploits a victim’s prior relationship and authority with a Website to allow unwanted or unapproved actions by a malicious hacker.

Several CSRF exploits have been reported. One particular CSRF vulnerability in phpMyAdmin (CVE-2006-5116) could allow a remote attacker to perform unauthorized activities posing as another user simply by setting a token in a specially crafted URL. Another CSRF issue demonstrated at the 2006 BlackHat conference showed that a user’s DSL router configuration could easily be changed because the user’s browser automatically supplied the DSL router with the user’s credentials – even though the hacker (not the user) was accessing the DSL router.

CSRF exploits in security products are not limited to DSL routers. In an article at Calyptix, CSRF exploits were found to exist in at least four mainstream security appliances, allowing a remote user to gain administrative access.

XSS Filter Bypassing
With the large number of XSS issues plaguing the Web 2.0 world, administrators began utilizing filters to ward off XSS attacks. Filtering to block XSS attacks can be effective but is often found to be weak when the Website must support multi-national users. Simply put, most XSS filters are written to support a given character set for a specific language. To bypass the XSS filters, hackers simply switched the default language encoding (e.g., UTF-8 to US-ASCII).

XSS filter bypassing issues have been found in several software products including PHPNuke and the firewall product from NetGear (FVS318) that allowed hackers to run XSS attacks against FVS318 administrators.

Exponential XSS Attacks
While a traditional XSS attack targets an individual user, an exponential XSS attack targets hundreds or perhaps thousands of users. Proof of Concept code for an exponential XSS attack can now be found on the Internet.

The example attack, known as the “Nduja Connection,” is a worm that targets Web-based e-mail systems. It collects the e-mail of a given user, collects all of the user’s contact e-mail addresses, and then self-propagates to all of the user’s contacts. This exponential XSS attack was used successfully against Liberi.it, Tiscali.it, Licos.it, and Excite.com Web-based e-mail systems.

More Stories By Paul A. Henry

Paul Henry is global information security expert, with more than 20 years' experience managing security initiatives for Global 2000 enterprises and government organizations worldwide. At Secure Computing, he plays a key strategic role in new product development and directions. In his role as vice president of technology evangelism, he also advises and consults on some of the world's most challenging and high-risk information security projects, including the National Banking System in Saudi Arabia, Department of Defense's Satellite Data Project, USA, and both government as well as telecommunications projects through out Japan.

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
Julian 09/19/07 07:23:21 PM EDT

Awesome read - well done...
We recently wrote a blog post that's probably also of interest to readers on this topic. http://julian101.com/archives/88

It talks about Web2.0 and sheds some light on whether we're really at Web2.0 or Web 16.0...

Julian Stone - ProWorkflow.com

@ThingsExpo Stories
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp emp...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, will discuss how given the magnitude of today's applicati...
As popularity of the smart home is growing and continues to go mainstream, technological factors play a greater role. The IoT protocol houses the interoperability battery consumption, security, and configuration of a smart home device, and it can be difficult for companies to choose the right kind for their product. For both DIY and professionally installed smart homes, developers need to consider each of these elements for their product to be successful in the market and current smart homes.
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere delivers a more modern architectural approach to storage that doesn't require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbui...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
SYS-CON Events announced today that Avere Systems, a leading provider of hybrid cloud enablement solutions, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources. With decades of experience behind the company’s founders, Avere got its ...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, will discuss how by using...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
SYS-CON Events announced today that CAST Software will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CAST was founded more than 25 years ago to make the invisible visible. Built around the idea that even the best analytics on the market still leave blind spots for technical teams looking to deliver better software and prevent outages, CAST provides the software intelligence that matter ...
SYS-CON Events announced today that Daiya Industry will exhibit at the Japanese Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Ruby Development Inc. builds new services in short period of time and provides a continuous support of those services based on Ruby on Rails. For more information, please visit https://github.com/RubyDevInc.
As businesses evolve, they need technology that is simple to help them succeed today and flexible enough to help them build for tomorrow. Chrome is fit for the workplace of the future — providing a secure, consistent user experience across a range of devices that can be used anywhere. In her session at 21st Cloud Expo, Vidya Nagarajan, a Senior Product Manager at Google, will take a look at various options as to how ChromeOS can be leveraged to interact with people on the devices, and formats th...
SYS-CON Events announced today that Yuasa System will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Yuasa System is introducing a multi-purpose endurance testing system for flexible displays, OLED devices, flexible substrates, flat cables, and films in smartphones, wearables, automobiles, and healthcare.
SYS-CON Events announced today that Taica will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Taica manufacturers Alpha-GEL brand silicone components and materials, which maintain outstanding performance over a wide temperature range -40C to +200C. For more information, visit http://www.taica.co.jp/english/.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities – ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups. As a result, many firms employ new business models that place enormous impor...
SYS-CON Events announced today that SourceForge has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SourceForge is the largest, most trusted destination for Open Source Software development, collaboration, discovery and download on the web serving over 32 million viewers, 150 million downloads and over 460,000 active development projects each and every month.
SYS-CON Events announced today that Dasher Technologies will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives. Since 1999, we'v...
SYS-CON Events announced today that MIRAI Inc. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MIRAI Inc. are IT consultants from the public sector whose mission is to solve social issues by technology and innovation and to create a meaningful future for people.
SYS-CON Events announced today that Massive Networks, that helps your business operate seamlessly with fast, reliable, and secure internet and network solutions, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. As a premier telecommunications provider, Massive Networks is headquartered out of Louisville, Colorado. With years of experience under their belt, their team of...
SYS-CON Events announced today that TidalScale, a leading provider of systems and services, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TidalScale has been involved in shaping the computing landscape. They've designed, developed and deployed some of the most important and successful systems and services in the history of the computing industry - internet, Ethernet, operating s...