Security risk: The trick behind camouflaged links

For everything that's not in any way related to PureBasic. General chat etc...
Little John
Addict
Addict
Posts: 4805
Joined: Thu Jun 07, 2007 3:25 pm
Location: Berlin, Germany

Security risk: The trick behind camouflaged links

Post by Little John »

News: The trick behind camouflaged links
http://www.h-online.com/security/news/i ... 28927.html
Mohawk70
Enthusiast
Enthusiast
Posts: 404
Joined: Thu May 11, 2006 1:04 am
Location: Florida, USA

Re: Security risk: The trick behind camouflaged links

Post by Mohawk70 »

I came across a more informative article a few weeks ago
http://css.dzone.com/articles/htmls-black-sheep-element
HP Z800 Workstation
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
User avatar
luis
Addict
Addict
Posts: 3895
Joined: Wed Aug 31, 2005 11:09 pm
Location: Italy

Re: Security risk: The trick behind camouflaged links

Post by luis »

Nice.

anyway from the test page -> http://bilaw.al/2013/03/17/hacking-the- ... cters.html

selecting "open the link in a new window" or "new tab" you end up on the page referenced in the link, PayPal, bypassing the OnClick() and its javascript.
"Have you tried turning it off and on again ?"
Little John
Addict
Addict
Posts: 4805
Joined: Thu Jun 07, 2007 3:25 pm
Location: Berlin, Germany

Re: Security risk: The trick behind camouflaged links

Post by Little John »

Mohawk70 wrote:I came across a more informative article a few weeks ago
Oh well, there are so many "more informative articles" about different topics on the web ...
But the topic in this thread is the vulnerability that was recently discovered by Bilawal Hameed.
Little John
Addict
Addict
Posts: 4805
Joined: Thu Jun 07, 2007 3:25 pm
Location: Berlin, Germany

Re: Security risk: The trick behind camouflaged links

Post by Little John »

luis wrote:Nice.

anyway from the test page -> http://bilaw.al/2013/03/17/hacking-the- ... cters.html

selecting "open the link in a new window" or "new tab" you end up on the page referenced in the link, PayPal, bypassing the OnClick() and its javascript.
Interesting, thanks for the tip!
However, a malicious web page could additionally just disallow right-click, couldn't it?
MachineCode
Addict
Addict
Posts: 1482
Joined: Tue Feb 22, 2011 1:16 pm

Re: Security risk: The trick behind camouflaged links

Post by MachineCode »

The original article (http://bilaw.al/2013/03/17/hacking-the- ... cters.html) has this link in it -> "This link should take you to PayPal." When I hover the mouse over it, Firefox's status bar shows "www.paypal.co.uk". But when I click the link, it does indeed take me to PayPal, as expected. The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0). IE 9 fails and redirects to a non-PayPal site.

The problem with this sort of exploit is that the browser is expected to parse every line of JavaScript to mind-read (or second guess) the intended destination. Just because the DESCRIPTION says it's going to PayPal, doesn't mean the LINK actually has to! So we end up with browsers becoming bloated and acting like virus-scanners, constantly trying to read the link's mind when it shouldn't. We, as end users, are the ones that suffer.
Microsoft Visual Basic only lasted 7 short years: 1991 to 1998.
PureBasic: Born in 1998 and still going strong to this very day!
Mohawk70
Enthusiast
Enthusiast
Posts: 404
Joined: Thu May 11, 2006 1:04 am
Location: Florida, USA

Re: Security risk: The trick behind camouflaged links

Post by Mohawk70 »

MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0). IE 9 fails and redirects to a non-PayPal site.
Also from the same article
Embedding the script is child's play. Hameed has therefore informed Mozilla (and other browser makers) of his discovery, but has yet to receive a response. Google is, according to "internet rumours", already working on a fix. Opera is currently the only browser where this trick doesn't work.
Last edited by Mohawk70 on Wed Mar 27, 2013 1:46 am, edited 1 time in total.
HP Z800 Workstation
CPU : Dual Xeon 5690 3.46GHz
RAM : 192GB RAM
GPU : NVIDIA QUADRO P5000 16GB
Little John
Addict
Addict
Posts: 4805
Joined: Thu Jun 07, 2007 3:25 pm
Location: Berlin, Germany

Re: Security risk: The trick behind camouflaged links

Post by Little John »

MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).
User avatar
Lord
Addict
Addict
Posts: 907
Joined: Tue May 26, 2009 2:11 pm

Re: Security risk: The trick behind camouflaged links

Post by Lord »

Little John wrote:
MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).
Just disable JavaScript.
As I run NoScript, I always explore a web site with JavaScript off
and switch Script on only if really needed.
Image
c4s
Addict
Addict
Posts: 1981
Joined: Thu Nov 01, 2007 5:37 pm
Location: Germany

Re: Security risk: The trick behind camouflaged links

Post by c4s »

Little John wrote:However, a malicious web page could additionally just disallow right-click, couldn't it?
You can also open it via middle-click. I'm used to open every link that way.
Little John wrote:The current Firefox version 19.0.2 is not immune (tested on Windows XP).
I can confirm that... Previous versions aren't immune either. It most likely works because in that case JavaScript was disabled.
Lord wrote:Just disable JavaScript. [...]
What a bad idea. Nowadays JavaScript isn't something to play around with as it used to be years ago: Nearly every "up to date" website depends on it for styling purposes, to allow certain functionality etc.
If any of you native English speakers have any suggestions for the above text, please let me know (via PM). Thanks!
User avatar
Lord
Addict
Addict
Posts: 907
Joined: Tue May 26, 2009 2:11 pm

Re: Security risk: The trick behind camouflaged links

Post by Lord »

c4s wrote:...
Lord wrote:Just disable JavaScript. [...]
What a bad idea. Nowadays JavaScript isn't something to play around with as it used to be years ago: Nearly every "up to date" website depends on it for styling purposes, to allow certain functionality etc.
It works for me. I decide which site I can trust.
If you trust all sites: leave script on.
Image
SFSxOI
Addict
Addict
Posts: 2970
Joined: Sat Dec 31, 2005 5:24 pm
Location: Where ya would never look.....

Re: Security risk: The trick behind camouflaged links

Post by SFSxOI »

I'm amazed you folks, and others on the 'net, are just finding out about this. I warned about this months ago when we finished our testing here, and its been all over the internet for months. The long and short of it is if you have java installed you are vulnerable, no matter the browser used even if it does seem to not be affected by the very simple unsophisticated 'test' in the link given.
Little John wrote:
MachineCode wrote:The article claims only Opera is immune, but obviously Firefox is, too (I'm using 18.0).
This is interesting. The current Firefox version 19.0.2 is not immune (tested on Windows XP).
Actually, no browser is immune. That simple test is no where near the sophistication of the exploits of Java out there. Chances are most of you have actually visited a Java exploit link just by viewing a web page with an exploited link on it, or a web page with a link on it that pointed to another web page with an exploited link on it, without even clicking the exploited link or the link to the other web page and did not even realize it. It may not have installed any malware silently without you being aware of it, but you probably added to some clicks for pay somewhere at the very minimum for a bot net without realizing it.
Last edited by SFSxOI on Sun Mar 24, 2013 12:36 pm, edited 2 times in total.
The advantage of a 64 bit operating system over a 32 bit operating system comes down to only being twice the headache.
Little John
Addict
Addict
Posts: 4805
Joined: Thu Jun 07, 2007 3:25 pm
Location: Berlin, Germany

Re: Security risk: The trick behind camouflaged links

Post by Little John »

SFSxOI wrote:The long and short of it is if you have java installed you are vulnerable, no matter the browser used
:?:

The problem here is caused by JavaScript, not by Java.
SFSxOI
Addict
Addict
Posts: 2970
Joined: Sat Dec 31, 2005 5:24 pm
Location: Where ya would never look.....

Re: Security risk: The trick behind camouflaged links

Post by SFSxOI »

Little John wrote:
SFSxOI wrote:The long and short of it is if you have java installed you are vulnerable, no matter the browser used
:?:

The problem here is caused by JavaScript, not by Java.

Hmmm... no....the problem is caused by Java being installed, period. You are just seeing one aspect of how it can be exploited that's all.

We do this professionally, contract to investigate these things for major companies and governments and develop counter measures. The counter measure here is to uninstall Java or at least turn it off. Even with the 'security fixes' for java that have been put out it still remains vulnerable. The internet is a very hostile environment, if its something that touches the internet that can be exploited its a pretty good chance it has been exploited even if not made public yet. For example, Oracle knew about this almost a year ago but said nothing.
Last edited by SFSxOI on Sun Mar 24, 2013 12:49 pm, edited 2 times in total.
The advantage of a 64 bit operating system over a 32 bit operating system comes down to only being twice the headache.
User avatar
luis
Addict
Addict
Posts: 3895
Joined: Wed Aug 31, 2005 11:09 pm
Location: Italy

Re: Security risk: The trick behind camouflaged links

Post by luis »

Little John wrote: Interesting, thanks for the tip!
However, a malicious web page could additionally just disallow right-click, couldn't it?
Certainly, you see that often in "normal" web sites when they fear you can stole something from them using "save as".
A site which does that with the clear intention of limit the browser functionality is no better then a malware IMO. And rub me the wrong way.
So, if the "open in another tab/window" does not work, this should ring a small alarm bell and you can leave the site in disgust or if you are really curios you can disable javascript and continue for what it's possible.
The idea should be: you browse relaxed (never completely, this is the real world) on a well known site you trust, and when visiting a dubious site you switch mind and start to double check what you do, inspect the links, inspect the source and so on.

Anyway, the "open in another tab/window" is something even a normal user without any particular knowledge can keep in his back of tricks, and can help in this case. So it's nice to know I think.
"Have you tried turning it off and on again ?"
Post Reply