by ers35 on 8/18/15, 1:07 PM with 154 comments
by jerf on 8/18/15, 2:30 PM
On the flip side, if you're doing a security test like this, I've gotten mileage out of convincing apps to access local resources with things like 127.88.23.245, precisely because the developer blocked 127.0.0.1 specifically and thought they were done.
You should also usually block all internal and external IPs for your entire network, but especially in the cloud this can begin to get tricky. Still, you should.
And don't forget IPv6.
by mike-cardwell on 8/18/15, 2:05 PM
"Pocket does not provide monetary compensation for any identified or possible vulnerability."
Cheapskates. This could have cost them money if somebody abusive had discovered it first. He deserves a monetary award.
[edit] Should we be concerned about the massive number of people listed on that page who have found security problems with Pocket? I counted 153 separate people...
by skarap on 8/18/15, 5:10 PM
I guess the DevOps trend (i.e. not hiring sysadmins) should take it's share of blame. Or maybe it's the other way around - you don't care for security, so there is no point in hiring security experts?
by BenjaminWill on 8/18/15, 4:17 PM
How much did Telefonica pay you for the Hello integration?
But sure, our surfing history will be secure ...
https://blog.mozilla.org/advancingcontent/2015/05/21/providi...
Did you guys acutally read your PR-bullshit here?
But soon a new small, fast, free, secure open-source browser will arrive and Mozilla will be history. But your pocket full. Well done.
by cddotdotslash on 8/18/15, 2:04 PM
by ddlatham on 8/18/15, 2:36 PM
Some ideas:
- Move the service doing the fetching to an untrusted network. At least it would be unable to access any internal services and any compromises there would be hopefully limited. You still have the problem that the local machines there could potentially be compromised.
- Validate / verify the URL to ensure it's not hitting anything internal. This sounds hard. Pre-resolve the name and check to see if the IP is in an internal range? Seems easy to get our of date as your network changes. Make sure to repeat for any redirects? Is there a better way to validate?
- Ensure that all internal services require authentication. This also sounds hard and easy to miss something.
by pdkl95 on 8/18/15, 3:46 PM
I'm not trying to single out Pocket; they are just the latest evidence that even in the few cases where "you can trust us with your data" is said honestly, it isn't a promise that can be kept in practice.
by falcolas on 8/18/15, 1:25 PM
These keys are rotated relatively frequently, but it opens up a whole new level of exploits against the company which runs those AWS servers.
by schmichael on 8/18/15, 4:54 PM
by mrbig4545 on 8/18/15, 1:47 PM
by billyhoffman on 8/18/15, 2:30 PM
At the very least, run it on localhost:10101 or something. Don't give us another range to have to filter!
by robn_fastmail on 8/19/15, 9:38 PM
http://www.slideshare.net/d0znpp/ssrf-attacks-and-sockets-sm...
Its thrilling and terrifying :)
by hundt on 8/18/15, 4:26 PM
by halosghost on 8/18/15, 2:44 PM
Admittedly, I suppose it would be nice if Firefox actually packaged Pocket as a real extension that could be removed from the Extensions menu, but they have already integrated several things without using that schema.
I still use firefox, just with more and more things disabled, because none of the other browsers out there even come close to having what I need in a GUI browser (though, I would note that I'm evermore tempted to abandon GUI browsing altogether).
Either way, the write-up is great, and everything in the article other than that one characterization (which rubbed me a bit the wrong way in the wake of all the fevered discussions around the Pocket Integration) was a truly enjoyable read. Not to mention, it's great that the Pocket devs fixed things quickly; that's always a plus!
by luxoria on 8/18/15, 4:12 PM
This is not a fair assumption to make. Maybe they are running a LSM like AppArmor.
by _navaneethan on 8/19/15, 6:48 AM
by Iuz on 8/18/15, 5:43 PM
by dafrankenstein2 on 8/18/15, 5:57 PM