by detectify on 7/27/16, 9:38 AM with 420 comments
by cyberpanther on 7/27/16, 12:25 PM
var parser = document.createElement('a');
parser.href = "http://example.com:3000/pathname/?search=test#hash";
parser.protocol; // => "http:"
parser.hostname; // => "example.com"
parser.port; // => "3000"
parser.pathname; // => "/pathname/"
parser.search; // => "?search=test"
parser.hash; // => "#hash"
parser.host; // => "example.com:3000"
by mcs on 7/27/16, 10:13 AM
If so, I am a little taken back by LastPass only offering $1,000 to the researcher that found and reported it for fixing. He or she could have taken a different path and resulted in this being used in some complex targeted attack against tech corporations via short-url redirect interstitial pages, or an ad network's javascript, etc. Given the potential damage, I'd say there is a missing zero or two on that reward amount, in my opinion.
by ktta on 7/27/16, 10:16 AM
I've been defending LastPass and recommending it to everyone till today. Now I'm thinking about how I might have to 'pay' for a software vulnerability in some private (read:unauditable by me) code. All the comments about offline, local backups make sense to me.
But the points I usually make are still valid, like:
1. I can go to any computer with chrome and get access to all my passwords, so don't have to carry my passwords with me everywhere.
2. Don't have to worry about storing passwords properly since lastpass is a good company and they know their stuff about protecting the customers' data.
3. Password capture. It might seem like a tiny feature, but I'm too lazy to remember opening an app and entering my credentials whenever I create an account or login into an old account.
4. Mobile login, although a paid feature, this really changes my life. If I don't trust a computer enough to login via chrome or something else, or want my secret notes, I just open up my phone.
But all the above features meaning nothing when it comes to the chance of compromising all my passwords (except bank info, of course)
I'd like to hear the thoughts of anyone else who uses lastpass and what they think.
by viraptor on 7/27/16, 10:00 AM
(to save a click: Tavis Ormandy: "Are people really using this lastpass thing? I took a quick look and can see a bunch of obvious critical problems. I'll send a report asap.")
by avolcano on 7/27/16, 10:01 AM
by jacobsladder on 7/27/16, 5:04 PM
I think the company should have paid $100,000.
by punjabisingh on 7/27/16, 5:06 PM
Furthermore, the current live version on Firefox addons repository is 3.x [3], which the LastPass team claims is not vulnerable. [1]
[1] https://blog.lastpass.com/2016/07/lastpass-security-updates.... [2] https://labs.detectify.com/2016/07/27/how-i-made-lastpass-gi... [3] https://addons.mozilla.org/en-US/firefox/addon/lastpass-pass...
by xur17 on 7/27/16, 3:55 PM
Does anyone know why that is the case? It seems like this exploit is just taking advantage of the js that autofills forms on the page based on domain. You can still use autofill if you have multifactor enabled.
by lukasm on 7/27/16, 12:29 PM
It's just a tiny overhead to my workflow.
by yonilevy on 7/27/16, 3:04 PM
by 0xmohit on 7/27/16, 10:44 AM
An example is Vault [0].
Encryptr [1] is another alternative: it claims that "all of your data will be saved in encrypted format in our Zero Knowledge [2] cloud".
[0] https://github.com/hashicorp/vault
by zouhair on 7/27/16, 10:13 AM
by baby on 7/27/16, 1:47 PM
var fixedURL = URL.match(/^(.*:\/\/[^\/]+\/.*)@/);
fixedURL && (url = url.substring(0, fixedURL[1].length) + url.substring(fixedURL[1].length).replace(/@/g, "%40"));
It looks like:* fidexURL is whatever is after :// and up until the very last @ (greediness)
* the second line fixedURL && is going to complete if fixedURL is not undefined
* url = this fixedURL, then the rest of it where @ was replaced by %40
so basically, entering http://avlidienbrunn.se/@twitter.com/@hehe.php will give
url = avlidienbrunn.se/@twitter.com/%40hehe.php
if I understand correctly. What happens after?
EDIT: it must be that the last [^/.]* before @ is taken as the domain name. But why splitting the URL before a @ sign? I'm confused
by danr4 on 7/27/16, 3:20 PM
[1] https://www.dashlane.com/download/Dashlane-Security-Whitepap...
by pdxpatzer on 7/27/16, 3:15 PM
Why isn't PasswordSafe more popular ? What do other password managers have that Password Safe does not ?
by archangel11235 on 7/27/16, 7:34 PM
by PeterWhittaker on 7/27/16, 1:48 PM
The open questions are a) how long the flaw existed prior to being fixed and b) whether attackers were able to exploit the flaw.
by dkopi on 7/27/16, 10:34 AM
http://www.zdnet.com/article/lastpass-zero-day-vulnerability...
by pmarreck on 7/27/16, 2:46 PM
by mohsinr on 7/27/16, 1:32 PM
by tombert on 7/27/16, 1:28 PM
Anyway, I'm glad that LastPass has resolved this; last thing I want in the news is another big password breach.
by pbininda on 7/27/16, 9:58 AM
Update: after a few answers to my badly thought through comment, I now feel enlightened. The attack scenario is a malicious web site which can gobble up my passwords. Thanks
by paulmd on 7/27/16, 7:04 PM
Running as a separate application outside the browser is 95% as easy thanks to auto-type.
by dkersten on 7/27/16, 10:43 AM
"Also, this would not work if multi factor authentication was on, so you should probably enable that as well."
If you have something as important as a password manager (ie something that holds the keys to ... everything), then MFA is a must. If you use LastPass without MFA, then you're probably asking for trouble.
by JustUhThought on 7/29/16, 2:37 PM
by mmaunder on 7/27/16, 11:19 PM
https://twitter.com/taviso/status/758143119409885185
Tavis has made quite a name for himself lately by going after AV vendors with no mercy. So when he tweeted, the community sat up and took notice. (Our own Slack was busy with discussion about this today)
Mathias, author of this post replied to Tavis with this:
https://twitter.com/avlidienbrunn/status/758232557829914624
The fix for the detectify exploit has already been pushed to users, so I'm guessing they were holding onto this public disclosure but Tavis putting his sights on lastpass too caused them to move the schedule up a little.
And the exploit from Tavis from 4 hours ago:
https://bugs.chromium.org/p/project-zero/issues/detail?id=88...
by sergioisidoro on 7/27/16, 4:22 PM
It does erase the fields and promoted 2fa, but passwords are available briefly.
I Sent a ticket to their supportthey, they acknowledged the issue and just asked me to disable local cache... (Chrome extension)
by artursapek on 7/27/16, 2:04 PM
You could even use replaceState to change it back immediately.
by EGreg on 7/27/16, 2:42 PM
In fact, I'd go further and say that you can do this with your login name. So for example:
myemail+by@gmail.com for eBaY
This also helps mitigate those attacks where the attacker actually contacts support and socially engineers them into giving all your info and even stealing your account:
https://medium.com/@espringe/amazon-s-customer-service-backd...
If you are hosting with AWS you should really consider doing that
by cdecker on 7/27/16, 11:40 AM
by lyonlim on 7/27/16, 2:39 PM
People who enable it might not understand the repercussions.
I use 1Password and always invoke a shortcut to fill in my credentials.
by Christofer on 7/28/16, 7:20 AM
First I decided 1Password to replace LastPass, but it puts a lot of weight on my pockets as it's very expensive. Then I encounter Enpass. It's a really good password manager. What I like about Enpass is that it saves database locally on my device not on their server and gives the desktop app for free.
It's worth to try and it hardly takes a few minutes to move all your LastPass database into into Enpass. https://www.youtube.com/watch?v=Fn69hHur3Jo
by giuscri on 7/27/16, 11:45 AM
Thanks! :-)
by neuroid on 7/27/16, 10:02 PM
[1]: https://blog.lastpass.com/2016/07/lastpass-security-updates....
[2]: https://bugs.chromium.org/p/project-zero/issues/detail?id=88...
by tedmiston on 7/27/16, 4:33 PM
It's easy to forget that sandboxed extensions don't exist yet in iOS (as of 9.3.3), and sometimes we still have to use bookmarklets.
As far as I know, bookmarklets aren't afforded any level of sandboxing type protection. I wonder if a malicious page could intervene like that.
by cyphar on 7/27/16, 11:09 PM
by diziet on 7/27/16, 9:56 AM
by DonHopkins on 7/27/16, 3:14 PM
by raverbashing on 7/27/16, 10:03 AM
How (and how often) are updates pushed to the client?
by nxzero on 7/27/16, 10:42 AM
by cheald on 7/27/16, 6:41 PM
by cyberpanther on 7/27/16, 2:20 PM
by kmiroslav on 7/27/16, 12:10 PM
What's the difference with simply going to "http://twitter.com"?
This looks more like a bug than a vulnerability, what am I missing?
by thulebag on 7/28/16, 1:32 AM
Remote JavaScript could trigger the export all passwords feature...
by Canada on 7/27/16, 12:19 PM
by gohrt on 7/27/16, 9:12 PM
by ryanlm on 7/27/16, 3:26 PM
by necessity on 7/27/16, 4:15 PM
I'm not sure if it is, bugs like that are a serious threat. Personally I use the same (long) password for every website, except one of the characters which I replace by the website's first letter. One could think of similar, more sophisticated schemes of password reuse that yield a slightly different password for each website.
It would be even better if websites started using a public key authentication system, though.