Bug 1368873 - FalseCONNECT: HTTPS MITM via Proxy Authentication headers
Summary: FalseCONNECT: HTTPS MITM via Proxy Authentication headers
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1348264
TreeView+ depends on / blocked
 
Reported: 2016-08-22 02:02 UTC by Doran Moppert
Modified: 2021-02-17 03:26 UTC (History)
11 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw in the implementation of HTTP proxy authentication in WebKit made it possible for attackers on the local segment who can execute man-in-the-middle attacks between the browser and the proxy server to inject malicious Javascript that will be executed as though it came from an HTTPS site the user is visiting.
Clone Of:
Environment:
Last Closed: 2016-08-30 00:31:35 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2549081 0 None None None 2016-08-29 05:32:32 UTC

Description Doran Moppert 2016-08-22 02:02:48 UTC
A flaw in the implemnetation of HTTP proxy authentication in WebKit made it possible for attackers on the local segment who can execute man-in-the-middle attacks between the browser and the proxy server to inject malicious Javascript that will be executed as though it came from an HTTPS site the user is visiting.

Comment 1 Michael Catanzaro 2016-08-22 12:21:30 UTC
Hi, this is the first we (WebKitGTK+ upstream) have heard of the issue; it doesn't yet appear on any Apple security advisories and we haven't been contacted separately about it. Can you provide a link to details on the vulnerability? If there is a private bug report on bugzilla.webkit.org, please CC me on the bug.

Comment 2 Tomas Hoger 2016-08-22 12:58:02 UTC
Reporter's site that should have been linked here.

External References:

http://falseconnect.com/

Comment 3 Michael Catanzaro 2016-08-22 16:04:14 UTC
The implementation vulnerability reported here is fixed in CFNetwork (in Core Foundation), not in WebKit, so only Apple products are affected. However, I have not checked to ensure that our stack does not have the same implementation flaw.

Comment 4 Dan Winship 2016-08-23 15:59:50 UTC
(Agree that from what I can see, this probably doesn't actually affect WebKitGTK.)

Comment 5 Christian Horn 2016-08-24 02:37:20 UTC
I think these are references to the same vulnerability:
https://www.kb.cert.org/vuls/id/905344
http://jvn.jp/vu/JVNVU90754453/index.html (Japanese)

Comment 7 Doran Moppert 2016-08-24 07:50:32 UTC
(In reply to Michael Catanzaro from comment #3)
> The implementation vulnerability reported here is fixed in CFNetwork (in
> Core Foundation), not in WebKit, so only Apple products are affected.
> However, I have not checked to ensure that our stack does not have the same
> implementation flaw.

This appears to be correct:  the report identified "WebKit" as the vulnerable component, but the vulnerable behaviour is not reproducible on any webkit browsers we have tested (eg midori, epiphany).  The issue seems to be limited to Apple products.

Comment 8 Doran Moppert 2016-08-24 07:55:13 UTC
To summarise this issues impact for Red Hat customers:

  - FalseCONNECT was reported as a flaw in Apple WebKit products (browsers and other software which acts as HTTP client) which could be exploited by malicious proxy servers or man-in-the-middle attackers in front of the proxy server

  - No Red Hat products are known to be affected by this flaw.  Specifically, Firefox and Chromium are unaffected; Midori and Epiphany are unaffected; webkitgtk/qtwebkit/kdewebkit do not exhibit the same flaw.

Proxy servers were not vulnerable to FalseCONNECT:  the vulnerability lay in browsers (and browser-like components) incorrectly handling malformed responses from the proxy server.


As far as response/mitigation:

  - Apple released updates for their platforms prior to this issue going public (see http://www.falseconnect.com/ for details)

  - No non-Apple products are known to be affected

  - Affected systems that can not receive security updates from Apple *may* be able to be protected by disabling proxy support altogether, including automatic proxy discovery from the network

Comment 9 Michael Catanzaro 2016-08-24 11:37:20 UTC
OK great, thanks for testing it. (We could have made the same mistake!)


Note You need to log in before you can comment on or make changes to this bug.