Desmond File

Blog archive

Phishing with Hand Grenades

In the drowsy space between the Christmas and New Year's holiday, a little presentation by Italian security researchers nearly went unnoticed, despite the fact that it unearthed a show-stopping security hole in a nearly ubiquitous application.

That application is the Adobe Acrobat browser plug-in, which does its thing whenever you click on a link to a PDF file on a Web site. The plug-in accepts JavaScript to do things like open a linked PDF and jump down in the document to a bookmark described in the JavaScript code, or to open the Print dialog box once the file has loaded. The JavaScript that gets executed is contained directly in the URL.

Sounds useful, right? The problem is the Acrobat plug-in doesn't discriminate what JavaScript code it will run. So a malicious party can present a trusted link to a legitimate PDF file - say, tax forms at a major bank's Web site -- and use the JavaScript in their link to do...well, just about anything. Including displaying an HTML Web page that looks exactly like the legitimate login page of the bank. It can even change the appearance of the address so everything looks kosher to the user.

Now you're phishing with hand grenades.

JavaScript cross-site scripting attacks are hardly new. But this one is unique in that any site that hosts a PDF is vulnerable, and there is simply no way to detect whether or not an attack has occurred.

"The scary thing about this attack is regardless of me as a bank or a financial services provider, no matter how secure I made it, if I host PDFs I now have a vulnerability," says Billy Hoffman, lead R&D engineer for SPI Dynamics.

Adobe has scrambled to patch the vulnerability, which affects Acrobat 4.0 and later, but Hoffman questions how many millions of unpatched clients are still out there. He also says that Adobe's lesson is one that corporate developers need to take to heart. In short, development managers need to think more critically when it comes to connected apps, and avoid crafting open-ended functionality that can get terribly misused.

"I would say the big [mistake] was they really didn't think through the repercussions of this feature," Hoffman says. "I've never seen a PDF need to use JavaScript or have JavaScript render or manipulate a PDF. They were putting in features that really didn't need to be there. They put this in, but really no one thought of what the security implications would be."

What are your thoughts on the Adobe plug-in vulnerability? Did Adobe royally muck it up, or is it simply making the same mistakes as the rest of us on a bigger stage? E-mail me at [email protected].

Posted by Michael Desmond on 01/17/2007 at 1:15 PM


comments powered by Disqus

Featured

  • VS Code Now Has Apple Silicon Builds for Native Mac Development

    Goodbye Rosetta, hello M1. Visual Studio Code has been updated with new builds that let it run natively on machines with Apple Silicon (M1), the company's own ARM64 chips.

  • Visual Studio 2019 for Mac v8.9 Ships with .NET 6 Preview 1 Support

    During its Ignite 2021 online event for IT pros and developers this week, Microsoft shipped Visual Studio 2019 for Mac v8.9, arriving with out-of-the-box support for .NET 6 Preview 1, which the company also released recently.

  • Analyst: TypeScript Now Firmly in Top 10 Echelon (Ruby, Not So Much)

    RedMonk analyst Stephen O'Grady believes TypeScript has achieved the rare feat of firmly ensconcing itself into the top 10 echelon of his ranking, now questioning how high it might go.

  • Black White Wave IMage

    Neural Regression Using PyTorch: Training

    The goal of a regression problem is to predict a single numeric value, for example, predicting the annual revenue of a new restaurant based on variables such as menu prices, number of tables, location and so on.

Upcoming Events