A security researcher has found, reported, and now disclosed a dozen bugs that made it easy to steal sensitive information or take over any customer’s account from some of the largest web hosting companies on the internet.
In some cases, clicking on a simple link would have been enough for Paulos Yibela, a well-known and respected bug hunter, to take over the accounts of anyone using five large hosting providers — Bluehost, Dreamhost, Hostgator, OVH, and iPage.
“All five had at least one serious vulnerability allowing a user account hijack,” he told TechCrunch, which he shared his findings with before going public.
The results of his vulnerability testing likely wouldn’t fill customers with much confidence. The bugs, now fixed — according to Yibela’s writeup, represent cases of aging infrastructure, complicated and sprawling web-based back-end systems, and company each with a massive user base —with the potential to go easily wrong.
In all, the bugs could have been used to target any number of the collective two millions domains under Endurance-owned Bluehost, Hostgator and iPage, Dreamhost’s one million domains and OVH’s four million domains — totaling some seven million domains.
Most of Yibela’s attacks were simple enough, but effective if combined with a targeted spearphishing campaign that targeted high-profile users. With domain registration data available for most large clients on registrar WHOIS databases, most of the attacks would have relied on sending the domain owner a malicious link by email and hoping that they click.
A demo of a simple hack, involving a one-click link that lets an attacker break in and takeover a user’s account. (Paulos Yibela/YouTube)
Yibela also found that the attack could work in the form of a cross-site scripting (XSS) attack. He demonstrated how a single click on a malicious link could instantly swap out a Dreamhost account owner’s email address for one that an attacker uses, allowing Yibela — or an attacker — to send a password reset code to be sent to the email of the attacker, permitting an account takeover.
Hostgator, meanwhile, suffered from several vulnerabilities, including a similar CSRF flaw that tricked countermeasures to prevent a cross-site script from running, which allowed him to add, edit, or modify any data in the victim’s profile, such as an email address that could be used to reset the user’s password.
Yibela also found several other lesser-likely but still serious flaws, allowing man-in-the-middle attacks on a local network — such as a public Wi-Fi hotspot.
OVH, meanwhile, had a similar flaw that allowed Yibela to bypass its CSRF protections that allow him to add, change or edit user profile data. By using another vulnerability in its API, it could’ve allowed an attacker to fetch and read responses from OVH.
And, iPage, had a similar one-click flaw which could be easily exploited because the web host doesn’t require an old or current password when resetting the account’s login details. That made it possible for an attacker to craft a malicious web address which, when clicked, would reset the password to one of the attacker’s choosing — allowing them to login as that user.
Most of the web hosting companies also fixed other information and data leaking flaws, also discovered by Yibela.
All of the companies, besides OVH — which didn’t respond to a request for comment sent prior to publication — confirmed that the bugs were fixed.
Kristen Andrews, a spokesperson for Endurance, a web hosting company that owns Bluehost, Hostgator and iPage, said that the company has “taken steps to address and patch the potential vulnerabilities in question,” but, when asked, did not say if the bugs had been exploited or if customer accounts or data had been compromised.
Dreamhost, meanwhile, said it fixed the bugs “less than 48 hours later,” according to spokesperson Brett Dunst, and found no evidence to suggest anyone exploited the bug outside Yibelo’s testing.
“After a thorough review of our system access logs we can confirm that no customer accounts were affected and no customer data was compromised,” he said. “The exploit would have required a logged-in DreamHost user to click a specially-formatted malicious link to alter their own account’s contact information.”
It’s remarkable to think that of all the ways to break into a website, often — as Yibela showed — isn’t through any convoluted attack or busting firewalls. It’s simply through the front door of the site’s host, requiring little effort for the average hacker.
This post was originally posted at http://feedproxy.google.com/~r/Techcrunch/~3/djuJEu-gMIM/.