Aykira Internet Solutions

Cyber Security Consultants Sydney

  • Cybersecurity Services
    • AI Security
    • Cybersecurity Expert Sydney
    • Personal Information Security
  • Cloud Systems
    • Website Security
    • Business Impact
  • Books & Resources
    • Merch
  • Blog
  • Contact

New security flaw in OAuth and OpenID found

Posted on May 5, 2014 by Keith Marlow

This new flaw, called the Covert Redirect flaw, was first reported by a Singaporea PhD student in mathematics from Nanyang Technological University. The Covert Redirect flaw is not so easily patched as heartbleed…

What is the Covert Redirect flaw?

The flaw allows hackers to modify the process of logging into a site, silently redirecting people to dangerous websites where data can be hacked. This is quite dangerous as unlike common pop-up techniques that use a realistic but recognisable fake domain name, this flaw allows the hacker to use the real website to authenticate the data, and then steal it.

What is OAuth and OpenID?

These are two public technical standards that allow usernames and passwords to ‘span’ multiple different websites, avoiding the need for a distinct username and password per website. This avoids the issue of the user having to remember different username and password pairs for every website they have registered on.

Unlike the Heartbleed Bug, which is being patched quickly, there’s no easy or fast way to fix this problem. Facebook and the other companies affected are aware of it and working on it but no clear indication by when it will be fixed. Microsoft reported that it had looked into it and it was actually a third-party application issue rather than something they had control over.

“The patch of this vulnerability is easier said than done,” Wang wrote on his website. “If all the third-party applications strictly adhere to using a whitelist. Then there would be no room for attacks. However, in the real world, a large number of third-party applications do not do this due to various reasons. This makes the systems based on OAuth 2.0 or OpenID highly vulnerable.”

What is the solution to the Covert Redirect flaw?

The solution is as simple as setting up what is called a ‘whitelist’ on the redirect – so the redirect will only work for trusted websites on the whitelist.

 

Follow @AykiraInternet
This entry was posted in security, websites and tagged hackers, login, security. Bookmark the permalink.

Post navigation

← Internet Explorer Security Flaw
Do you need a technical co-founder? – well, it depends… →

Recent Posts

  • Open Source AuthN, AuthZ & VPN

    Given the historical hacking of major cloud based Authentication and Authorisation providers,…

  • Artificial IntelligenceThe Risks of Using AI in Cybersecurity

    Artificial intelligence (AI) has reshaped many aspects of business and cybersecurity, promising…

  • Zero Trust, the Hidden Pitfalls: Challenges and Failure Points in Implementation

    Zero Trust security model adaption has accelerated over the past decade, driven…

  • Implementing Zero Trust: Best Practices and Key Areas for Success

    In an increasingly interconnected digital world, the traditional network perimeter security model…

New Book!


Personal Information Security & Systems Architecture
Buy on Amazon.

Newsletter

Subscribe to our Mailing list now to receive advice, tips and news relating to systems architecture and security.




Archives


Tweets by @AykiraInternet

  • Legal
enquires@aykira.com.au

Privacy Policy
Legal
  • Facebook link
  • Twitter link
  • Linkedin link

© 2023 Aykira Pty Ltd

Zerif Lite developed by ThemeIsle