Desmond File

Blog archive

Phishing with Hand Grenades

In the drowsy space between the Christmas and New Year's holiday, a little presentation by Italian security researchers nearly went unnoticed, despite the fact that it unearthed a show-stopping security hole in a nearly ubiquitous application.

That application is the Adobe Acrobat browser plug-in, which does its thing whenever you click on a link to a PDF file on a Web site. The plug-in accepts JavaScript to do things like open a linked PDF and jump down in the document to a bookmark described in the JavaScript code, or to open the Print dialog box once the file has loaded. The JavaScript that gets executed is contained directly in the URL.

Sounds useful, right? The problem is the Acrobat plug-in doesn't discriminate what JavaScript code it will run. So a malicious party can present a trusted link to a legitimate PDF file - say, tax forms at a major bank's Web site -- and use the JavaScript in their link to do...well, just about anything. Including displaying an HTML Web page that looks exactly like the legitimate login page of the bank. It can even change the appearance of the address so everything looks kosher to the user.

Now you're phishing with hand grenades.

JavaScript cross-site scripting attacks are hardly new. But this one is unique in that any site that hosts a PDF is vulnerable, and there is simply no way to detect whether or not an attack has occurred.

"The scary thing about this attack is regardless of me as a bank or a financial services provider, no matter how secure I made it, if I host PDFs I now have a vulnerability," says Billy Hoffman, lead R&D engineer for SPI Dynamics.

Adobe has scrambled to patch the vulnerability, which affects Acrobat 4.0 and later, but Hoffman questions how many millions of unpatched clients are still out there. He also says that Adobe's lesson is one that corporate developers need to take to heart. In short, development managers need to think more critically when it comes to connected apps, and avoid crafting open-ended functionality that can get terribly misused.

"I would say the big [mistake] was they really didn't think through the repercussions of this feature," Hoffman says. "I've never seen a PDF need to use JavaScript or have JavaScript render or manipulate a PDF. They were putting in features that really didn't need to be there. They put this in, but really no one thought of what the security implications would be."

What are your thoughts on the Adobe plug-in vulnerability? Did Adobe royally muck it up, or is it simply making the same mistakes as the rest of us on a bigger stage? E-mail me at [email protected].

Posted by Michael Desmond on 01/17/2007 at 1:15 PM


comments powered by Disqus

Featured

  • Edit Local Images/Text from a .NET MAUI Blazor Hybrid App

    With .NET 6 and the latest Visual Studio 2022 preview, developers can create a hybrid Blazor/.NET MAUI app that can work with local machine resources in ways that ordinary Blazor (web) apps can't.

  • In VS 2022, WinForms Designer Still Chasing Parity with .NET Framework Version

    Microsoft provided an update on its years-long effort to bring the new Windows Forms designer up to speed with the old .NET Framework version.

  • See What's New for Git in Latest Visual Studio 2022 Update

    Four new Git features have been added to Visual Studio 2022 in the latest update, Preview 2, including the ability to compare branches and multi-repo branching.

  • Infragistics Adds 17 Controls to Blazor/Web Components Libraries

    Infragistics Ultimate 21.2 is out with an integrated low-code App Builder and 17 new controls for the Blazor and Web Components libraries of Ignite UI, the company's web-based UI toolkit.

Upcoming Events