Benjamin Daniel Mussler
Getting access to your Amazon account credentials is one of several holy grails for hackers. With access to your Amazon account, hackers can set-up new credit cards in your account or max out the current ones on file with some big Amazon purchases. Plus, staff details contained in your Amazon account can lead to the plundering of other online accounts.
It was Concerning then , When security researcher Benjamin Daniel Mussler Recently saidthat Amazon’s website was vulnerable to a staggeringly simple cross-site scripting attack.
The good news, however, Is that Amazon Appears To Have fixed the flaw at this writing. Mussler Told PCWorld via emailthat Amazon Appears To Have fixed the vulnerability after the security researcher blogged about it on Monday.
We’ve asked Amazon for confirmation of the fix and will update this post Should the company RESPOND.
The vulnerability
Imagine this scenario: You find an interesting free e-book online with a filename of “SuperCoolBook.mobi.” Since you want to read it, you download the book and then email it to your Kindle library using the handy Send to Kindle feature.
Later That Day, you’re checking out your Kindle Library on Amazon’s website When You notice a strange e-book. On closer inspection, you see That the title of the book, as DISPLAYED by Amazon, Appears to be computer code Such as
& lt; script src ="https://www.example.org/script.js"& gt; & lt; / script & gt;
Whoops! The metadata into Super Cool Book linked to a malicious JavaScript file instead of displaying a proper title. And by visiting Amazon’s site you’ve just enabled That malicious script to run, steal your session cookie, and get access to your Amazon account. Let the plundering and lulz begin.
At least that’s what could’ve happened if the vulnerability still existed, of according to Mussler.
Nate Hoff Elder, who runs the e-book centric blog The Digital Reader, reported That He Was Able to replicate the weakness as recently as Monday.
Even if this vulnerability was not fixed, however, it would only work under a very specific set of Circumstances. First, you’d have to be a heavy user of the Send to Kindle feature, and you’d need to be downloading e-books and other documents from sketchy places (read: pirate sites.)
Then you’d have to visit the “Manage Your Content and Devices” page before the script could run. Opening the document in an Amazon app would not be enough. I do not know about you, but prior to running my tests today I could not remember the last time I’d checked my Kindle library content on Amazon.com as opposed to inside an app.
Nevertheless, it’s Concerning That a malicious attack could happen just by getting tricky with the metadata. Good Thing It appears to be fixed.
This is the second time Müller discovered a scripting vulnerability on Amazon.com. In late 2013, Muller discovered the exact same flaw in Amazon’s site, Which the company fixed three weeks after it was first Notified. In July, Muller noticed the vulnerability had resurfaced. He DECIDED to publicize the issue after Amazon did not respond to his second discovery for more than two months.
Subscribe to the Security Watch Newsletter
Thank you for sharing this page.
Sorry! There was an error emailing this page
No comments:
Post a Comment