A pervasive vulnerability that allows an attacker to take over any Web browser and silently intercept sensitive data input occurs in Web 2.0 settings from Yahoo to ASP .Net to Google, security firm Fortify says.
Client-side libraries that Fortify inspected and found to be vulnerable are the Yahoo UI, Prototype, Script.aculo.us, Dojo, Moo.fx, jQuery, Rico and MochiKit.
According to Fortify, the other AJAX frameworks don't explicitly provide any protection, nor do their documentation materials mention the vulnerability as a security concern.
"The attacker can put code in a Web page," he said. "If he can trick you into running it in your browser, your browser can look like you and act like you, but it's not you; it's actually shoveling data back to - the attacker - ."
The text-based, human-readable format for representing objects and other data structures is mostly used to transmit structured data over a network connection.
Yahoo began offering some of its Web Services optionally in JSON in December 2005, and Google started offering JSON feeds for its GData Web protocol in December 2006.
One problem with JSON is that CSRF (cross-site request forgery) allows attackers to bypass the technology's cookie-based authentication, as DRW's creator, Walker, says in his blog.
Specifically, CSRF allows a user to invoke cookie-protected actions on a remote server, thus allowing "Mr. Evil to trick Mrs. Innocent into transferring money from her bank account into his," Walker wrote.
Walker is a developer and runs a consultancy called Getahead.
"I believe that JSON is unsafe for anything but public data unless you are using unpredictable URLs," he said in the same blog posting.
And more details from the Fortify paper:
Anywhere this vulnerability can occur, it does occur, Chess said, with the exception of in DWR. As for the major companies behind frameworks, most all said they will work on the vulnerability and that it will be fixed in the next version.
Microsoft, for one, told eWEEK that its MSRC is on this and that the company is investigating new public reports of possible vulnerabilities that occur in applications developed using the downloadable Microsoft ASP.NET AJAX framework.
A Microsoft spokesperson said that the company is not aware of any attacks attempting to use the reported issue or of customer impact at this time. Yahoo had not been able to provide comment by the time this story posted.
Google, for its part, has posted an article that shows developers how to prevent the vulnerabilities described by Fortify in all versions of the Google Web Toolkit.
"We plan to add additional, automatic safeguards in the next version of GWT, due out in the coming weeks, to supplement the security measures developers take on their own," a Google spokesperson added.
These companies have been through the security flaw grinder and know better than to ignore vulnerabilities, Chess said. The problem is that many developers aren't using frameworks from the big players at all - rather, they're rolling their own. Unfortunately, many such developers haven't yet embraced security as their responsibility - and it's this that's prompted Fortify to start banging the drum on the issue.
"Most people don't know when they use these AJAX-style components - i.e., frameworks - that they're at more risk," Chess said. "We need to talk to the AJAX community about what the problem is and what they have to do to address it."
The overwhelming reaction Fortify received from framework maintainers was that this vulnerability is a high-priority fix, Chess said.
What's surprising is the few instances in which framework developers said that security wasn't their problem.
"It makes me really mad to think there are developers out there who are fielding code and who expect people who are going to use that code to figure out all the security ramifications," Chess said.
Chess declined to name names, given that he's still working with them, trying to get recalcitrant developers to address the vulnerability.
The Array format is fairly commonly used and makes it easy to trick the browser, Chess said. Exploiting the vulnerability is all about having the conditions necessary to abuse the security policy implemented by a given Web browser. Unfortunately, Fortify found those conditions are fulfilled "a surprising amount of time," he said.
The problem with getting developers to accept responsibility for fixing the vulnerability is easy to spot after comparing AJAX hijacking to, say, buffer overflows, Chess said.
Nobody knows if this vulnerability is currently being used to steal data. That's because if somebody were using it for thievery, it would be undetectable, Chess said: "It very well could be being exploited right now and we wouldn't know it."
As far as how to fix it goes, Fortify's paper gets into the details. In many cases it would take as few as a dozen lines of code. What's of added interest, Chess said, is how the vulnerability came to be in the first place.
"We've got Web 2.0/AJAX kind of guys who want to do things with browsers and HTML and … - they - really weren't designed to do the work," he said. " - They're using - hacks and kludges to make things work. Sometimes that has unforeseen consequences. You get cobbled-together AJAX."
What's needed are standards and protocols and Web browsers that support them, Chess said. The teams at Microsoft and Mozilla that maintain IE and Firefox are where "the rubber hits the road," he said.
"Once they agree something's a standard, it's a standard," he said. There's a lot of people who try to influence them, but it's really they we look to and take cues from."
This vulnerability will likely further motivate standards setting bodies such as the IETF or the W3C, Chess said. Such organizations have often been where Microsoft's and Mozilla's people have come together to determine what will happen with standards and protocols.
"I think this will further motivate them," Chess said. "They've known about problems in this neighborhood. … But I don't think they've understood what a big deal their security decisions would be."
Copyright 2007 by Ziff Davis Media, Distributed by United Press International
Explore further: Collaboratively exploring virtual worlds