A security researcher has uncovered what appears to be a serious security flaw in Internet Explorer that could be exploited by malicious hackers to launch convincing phishing attacks and inject malicious code into users’ browsers as they visit websites.
David Leo published details of the flaw, including a link to a proof-of-concept exploit that demonstrates the attack working against the popular Daily Mail website, this weekend on the Full Disclosure mailing list.
The bug, which works on Internet Explorer 11 running Windows 7 or Wondows 8.1, is a universal cross-site scripting (XSS) vulnerability, and bypasses what is known as the Same-Origin Policy.
Same-Origin Policy (SOP) is an important cornerstone of web application security, and is how browsers limit the functionality of scripts running in users’ web browsers. Specifically, is intended to prevent a script running on a webpage one website to read or write from anything other than pages on the same website.
However, Leo appears to have found a way to waltz past the restriction in Internet Explorer.
In Leo’s example exploit page, users running Internet Explorer are invited to click a link opening the Daily Mail website – which opens normally but after seven seconds is replaced with content reading “Hacked by Deusen”.
It’s worth noting that the Daily Mail’s website has not itself been hacked, but the content displayed in the user’s browser has been surreptitiously altered.
What’s so convincing about such an attack, of course, is that the URL displayed inside the browser’s address bar does not change during the attack – meaning it would be possible for an attacker to easily embed code (such as a fake login page) or run malicious code from an external page without the user being aware that anything suspicious has happened.
Joey Fowler, a senior security engineer at Tumblr, confirmed the seriousness of the vulnerability in a later posting on the Full Disclosure mailing list:
As long as the page(s) being framed don’t contain X-Frame-Options headers (with `deny` or `same-origin` values), it executes successfully. Pending the payload being injected, most Content Security Policies are also bypassed (by injecting HTML instead of JavaScript, that is).
It looks like, through this method, all viable XSS tactics are open!
According to The Register, the flaw has been reported to Microsoft, and it is hoped that a security patch will be forthcoming – although no timeline for that has yet been provided.
The public disclosure of such a serious security flaw without giving Microsoft a chance to fix it in advance is sure to once again raise the question of whether researchers are acting responsibly – or whether their actions could be putting the majority of Internet Explorers at risk.
[…] A serious security flaw in Internet Explorer has been uncovered that could be exploited by malicious hackers to launch convincing phishing attacks and inject malicious code into users’ browsers as they visit websites. Learn more in my article on the Hot for Security blog. …read more […]
What is this obnoxious rubbish of shooting the messenger rather than lambasting the company responsible for the seriously flawed product? Time and time again, it’s proven that companies (esp. Microsoft) lacks any sense of urgency about security until such exploits are made public. Instead of criticizing the security researchers, why don’t you suggest that Microsoft and others have a 24/7 crisis response team that personally, urgently, and effectively communicates with security researchers, and provide a timeline to fix as though the exploit had been released to the public. Once fixed, Microsoft or whoever would than post the patch, update, etc. and recognize and publicly thank (or pay) the security researcher. As you should know, Google has a Vulnerability Reward Program – what does Microsoft have other than a cone of silence and bad case of lethargy?
[…] Major Internet Explorer vulnerability could lead to convincing phishing attacks […]
[…] researcher Graham Cluley reports “The bug, which works on Internet Explorer 11 running Windows 7 or Windows 8.1, is a […]
[…] researcher Graham Cluley reports “The bug, which works on Internet Explorer 11 running Windows 7 or Windows 8.1, is a […]
We are looking into the attack vector last 4 days.
In opposition to Joey’s tests the vulnerability can be technically exploited for sites having X-Frame-Option set to “deny†or “same-originâ€.
Thus popular social media are targets, as well as update delivery websites.
For example, the adobe web site can be injected at client-side to include a fake flash update. The certificate and the “lock†will look valid and trusted but the content is under question.
In regards to your closing paragraph: Microsoft was notified in October of last year.
http://seclists.org/fulldisclosure/2015/Feb/19
[…] A major vulnerability has been discovered that could expose the users of Internet Explorer and could inject malware into the user’s browsers when online. The cross-site scripting vulnerability bypasses the “Same-Origin†policy and works on Internet Explorer 11 running Windows 7 or 8.1. For more details on this bug, click here:: Major Internet Explorer vulnerability could lead to convincing phishing attacks […]
[…] Earlier this month, a security researcher discovered a major security flaw in Microsoft’s Internet Explorer browser. The vulnerability allows hackers to create malicious phishing attacks and inject code into user’s browsers. Read the full story here on Hot for Security. […]