Author Topic: mitm evilzone hijack  (Read 4251 times)

0 Members and 1 Guest are viewing this topic.

Offline relax

  • Sir
  • ***
  • Posts: 562
  • Cookies: 114
  • The one and only
    • View Profile
mitm evilzone hijack
« on: March 14, 2013, 02:41:02 pm »
I just tried out dsploit on my evilzone account and got a successful hijack.
correct me if I'm wrong but evilzone has ssl witch should encrypt traffic between browser and server, so a sniffer should get encrypted data witch it apparently does not.
My guess would be the flaw lays in the fact that the phpsessionid is set as a get post...


Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: mitm evilzone hijack
« Reply #1 on: March 14, 2013, 02:52:03 pm »
did you really use HTTPS:// and did not issue a SSL stripper?
~Factionwars

Offline relax

  • Sir
  • ***
  • Posts: 562
  • Cookies: 114
  • The one and only
    • View Profile
Re: mitm evilzone hijack
« Reply #2 on: March 14, 2013, 02:54:44 pm »
yes but heres the thing, https switches to http after change of page, would be fixed with https everywhere extension but thats kind of annoying.
« Last Edit: March 14, 2013, 02:57:17 pm by relax »

Offline Phage

  • VIP
  • Overlord
  • *
  • Posts: 1280
  • Cookies: 120
    • View Profile
Re: mitm evilzone hijack
« Reply #3 on: March 14, 2013, 03:44:45 pm »
I would like to agree with relax. I have experienced the same with the https and he has a point.
"Ruby devs do, in fact, get all the girls. No girl wants a python, but EVERY girl wants rubies" - connection

"It always takes longer than you expect, even when you take into account Hofstadter’s Law."

Offline 0poitr

  • Peasant
  • *
  • Posts: 149
  • Cookies: 64
    • View Profile
Re: mitm evilzone hijack
« Reply #4 on: March 14, 2013, 04:46:08 pm »
Well, firefox says connection to ez is only partially encrypted.
Imagination is the first step towards Creation.

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: mitm evilzone hijack
« Reply #5 on: March 14, 2013, 04:55:06 pm »
Well, firefox says connection to ez is only partially encrypted.
While Chrome complains about the certificate not having the same URL as the website (it has "*.evilzone.org" as the URL).

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: mitm evilzone hijack
« Reply #6 on: March 14, 2013, 05:07:48 pm »
My firefox warns that for example when posting a message its not encrypted and it happens in plain HTTP.
I have yet to check wireshark but im pretty sure thats correct.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline relax

  • Sir
  • ***
  • Posts: 562
  • Cookies: 114
  • The one and only
    • View Profile
Re: mitm evilzone hijack
« Reply #7 on: March 14, 2013, 05:44:43 pm »
My firefox warns that for example when posting a message its not encrypted and it happens in plain HTTP.
I have yet to check wireshark but im pretty sure thats correct.
thats actually true because it was when posting a message or changing settings the hijack is possible so far as i found. i also noticed that the PHPSESSID is exposed in url sometimes witch is really weird
http://i.imgur.com/g7X12KU.png from another post (not my screenshot btw)


edit:
It seems the topic links on "unread messages" links to http even though https is used
« Last Edit: March 14, 2013, 05:48:28 pm by relax »

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: mitm evilzone hijack
« Reply #8 on: March 14, 2013, 05:58:24 pm »
Im currently recording with wireshark to see what happens.
@This is a test message@

Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: mitm evilzone hijack
« Reply #9 on: March 14, 2013, 06:07:08 pm »
Look what we got here.
my browser clearly stated https:// while sending this.

Will try again to confirm.


*EDIT*

Quote
Although this page is encrypted, the information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?
Thats firefox complaining.
« Last Edit: March 14, 2013, 06:11:00 pm by proxx »
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline relax

  • Sir
  • ***
  • Posts: 562
  • Cookies: 114
  • The one and only
    • View Profile
Re: mitm evilzone hijack
« Reply #10 on: March 14, 2013, 06:12:35 pm »
well the interesting thing is not they read your message its the actually get your session id and can hijack you account


but then again one thing is connected to the other
« Last Edit: March 14, 2013, 06:12:59 pm by relax »

Offline RevHzShell

  • /dev/null
  • *
  • Posts: 5
  • Cookies: 0
    • View Profile
Re: mitm evilzone hijack
« Reply #11 on: March 14, 2013, 06:31:13 pm »
I noticed the behaviour exposing your SessID in other Simple Machines Forum. Maybe could be another issue.

Furthermore i can confirm Firefox establishes a partial encrypted connection to https://evilzone.org as displayed in website's informations.

EDIT:
And guess what? Editing this post being in https, I got a popup saying the data would have been sent in clear text, and after having saved the post I have no more https in my url bar, just evilzone.org/........
@proxx,  didn't pay attention you already mentioned this... i get exactly the same message you posted. However it's an additional confirmation.
« Last Edit: March 14, 2013, 07:01:00 pm by RevHzShell »

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: mitm evilzone hijack
« Reply #12 on: March 14, 2013, 07:12:18 pm »
well the interesting thing is not they read your message its the actually get your session id and can hijack you account


but then again one thing is connected to the other

I know, this was just to make a statement :)
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: mitm evilzone hijack
« Reply #13 on: March 15, 2013, 11:36:14 am »
We kind of forced this forum software into HTTPs. It has almost none HTTPs functions. We will look into this :)
~Factionwars

Offline relax

  • Sir
  • ***
  • Posts: 562
  • Cookies: 114
  • The one and only
    • View Profile
Re: mitm evilzone hijack
« Reply #14 on: March 31, 2013, 06:54:34 pm »
how about force https with .htaccess?

Code: [Select]
RewriteEngine on
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://%{HTTP_HOST}/$1 [R=301,L]



or there might be a reason for for not forcing https....
like some ppl might be able to get around the ssl cert warning message ^_^