35
TALE OF FORGOTTEN DISCLOSURE BY ANANT SHRIVASTAVA

Tale of Forgotten Disclosure and Lesson learned

Embed Size (px)

Citation preview

Page 1: Tale of Forgotten Disclosure and Lesson learned

TALE OF FORGOTTENDISCLOSURE

BYANANT SHRIVASTAVA

Page 2: Tale of Forgotten Disclosure and Lesson learned

ANANT SHRIVASTAVAInformation Security ConsultantAdmin - Dev - Securitynull + OWASP + G4H

and @anantshriCo-Author OWASP Testing Guide 4.0Projects

http://anantshri.info

     

Page 3: Tale of Forgotten Disclosure and Lesson learned

SCENARIO1. A vulnerability present in code (last updated March 2013)2. Public disclosure in aug 2014.3. Interestingly someone posted a pull request in Jan 20134. Till may 2015 it was not patched even though there was a new release after the

pull request was in place.

Page 4: Tale of Forgotten Disclosure and Lesson learned

INFORMATION RECIEVED

Page 5: Tale of Forgotten Disclosure and Lesson learned

INVESTIGATION RESULT1. Javascript Based DOM-XSS2. Culprit identified as facebook-page-photo-gallery wordpress plugin.3. Remove the plugin4. XSS Fixed; Issue closed5. End of Story

Page 6: Tale of Forgotten Disclosure and Lesson learned

EMAIL TO PLUGINS TEAM

Page 7: Tale of Forgotten Disclosure and Lesson learned

RESPONSE FROM PLUGIN TEAM

Page 8: Tale of Forgotten Disclosure and Lesson learned

MEANWHILEDISCOVERY REQUIRES EXPERIMENTATION

Page 9: Tale of Forgotten Disclosure and Lesson learned

REPOSITORY

Page 10: Tale of Forgotten Disclosure and Lesson learned

CRUX OF THE ISSUEfunction getHashtag(){

var url = location.href;

hashtag = (url.indexOf('#prettyPhoto') !== -1) ? decodeURI(url.substring(url.indexOf('#prettyPhoto')+1,url.length)) : false;

return hashtag;

};

Page 11: Tale of Forgotten Disclosure and Lesson learned

GOOGLE AHOY

Page 12: Tale of Forgotten Disclosure and Lesson learned

INTERESTING FACT

Page 13: Tale of Forgotten Disclosure and Lesson learned

CONTACTING AUTHOR

Page 14: Tale of Forgotten Disclosure and Lesson learned

SPREAD THE WORD

Page 15: Tale of Forgotten Disclosure and Lesson learned

SPREAD THE WORD

Page 16: Tale of Forgotten Disclosure and Lesson learned

SPREAD THE WORD

Page 17: Tale of Forgotten Disclosure and Lesson learned

FINALLY SOME ACTION

Page 18: Tale of Forgotten Disclosure and Lesson learned

SOME ACTION

Page 19: Tale of Forgotten Disclosure and Lesson learned

RELIEVEDLET THE WORLD BE IN PEACE

ANDLETS GET BACK TO WORK

Page 20: Tale of Forgotten Disclosure and Lesson learned

AFTER 7 DAYS

Page 21: Tale of Forgotten Disclosure and Lesson learned

WHY YOU NO FIX

Page 22: Tale of Forgotten Disclosure and Lesson learned

WORDPRESS PLUGIN INFO1. Total 35 Plugins Found

Total Plugin Downloads Active Install

2882520 3,37,780

Page 23: Tale of Forgotten Disclosure and Lesson learned

NERDY DATA

Page 24: Tale of Forgotten Disclosure and Lesson learned

WHAT IS VULNERABLE1. Any application / website which has jquery.prettyphoto.js2. Version 3.1.4 and 3.1.5 are confirmed vulnerable older versions not checked.

Page 25: Tale of Forgotten Disclosure and Lesson learned

WHAT IS A FIX1. Upgrade to 3.1.6

Page 26: Tale of Forgotten Disclosure and Lesson learned

ENOUGH OF THE PASTWHAT'S IN IT FOR ME.

Page 27: Tale of Forgotten Disclosure and Lesson learned

LESSONS TO BE LEARNED

Page 28: Tale of Forgotten Disclosure and Lesson learned

FOR DEVELOPER1. Never ignore pull requests and security issue bug report.2. Proactively test software and at-least if a fix is released publicly accept security

issue.

Page 29: Tale of Forgotten Disclosure and Lesson learned

FOR DEVELOPERS / SYSADMIN /DEVOPS

1. never ignore update from shared library2. Keep an eye on how shared resources are holding up.3. Monitor your Dependencies

Page 30: Tale of Forgotten Disclosure and Lesson learned

HOW

Page 31: Tale of Forgotten Disclosure and Lesson learned

HOW

Page 32: Tale of Forgotten Disclosure and Lesson learned

HOW

Page 33: Tale of Forgotten Disclosure and Lesson learned

IS THIS ENOUGH1. Not yet2. We still lack method to track it for every third party library.3. Manual tracking is still required.

Page 34: Tale of Forgotten Disclosure and Lesson learned

REFERENCES1. A9 - Using Components with Known Vulnerabilities2. https://www.owasp.org/index.php/Top_10_2013-A9-

Using_Components_with_Known_Vulnerabilities

Page 35: Tale of Forgotten Disclosure and Lesson learned

THANKS