[clug] Drive-By Pharming Attack Could Hit Home Networks

Michael Cohen michael.cohen at netspeed.com.au
Sat Feb 17 11:04:59 GMT 2007

On Sat, Feb 17, 2007 at 11:10:01AM +0100, Kim Holburn wrote:
> Steve Jenkins asked me to post this to clug.  It is of interest  
> because it is a non-platform specific attack.  ie it could  
> potentially work with a linux desktop client.
> The the attack in the article relies on default passwords but I was  
> thinking about this and wondering how many people talk to their home  
> routers using their normal browser and have the password set to be  
> remembered in their browser.  In that case an attack like this might  
> not even need the default password, it could get the browser to to  
> the work itself.

  That could normally not happen because the passwords etc are stored in
  firefox's password manager. The attack relies on JS posting a link to a known
  URL with known parameters. Normally JS is unable to get at the password
  manager's store (it would be a vulnrability if it could). Also normally a
  piece of JS on a malicious web site can not access objects on a page
  downloaded from a different domain (again its a vulnerability if it can). So
  a malicious JS can not access the username,password boxes on your routers
  page, even if it opened it and the password manager filled it in.

  That said scarrier things have happened.

  From a security point of view there is little exciting in the article - of
  course its a novel way of putting things together, but in reality if you have
  a default password and configuration of your router the vulnerability is in
  you - not the browser. Its possible to do same sort of things by sending a
  malicious word document, pdf or even a simple HTML email rendered in lookout
  (or sometime called outlook).  You dont need JS necessarily either, simply
  use img tags with the urls in the src attribute and anything that tries to
  render the images will reconfigure your router for you.


More information about the linux mailing list