TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Multiple Vulnerabilities in Pocket

533 pointsby ers35almost 10 years ago

18 comments

jerfalmost 10 years ago
A little tip for people trying to armor themselves against this problem: If your app reaches out to do network transactions, it really ought to block localhost. However, bear in mind that localhost isn&#x27;t &quot;127.0.0.1&quot;... it&#x27;s &quot;127.0.0.0&#x2F;8&quot; (or &quot;127.x.x.x&quot; if you don&#x27;t casually speak CIDR). Ping 127.2.88.33 on your console now... you&#x27;ll see replies.<p>On the flip side, if you&#x27;re doing a security test like this, I&#x27;ve gotten mileage out of convincing apps to access local resources with things like 127.88.23.245, precisely because the developer blocked 127.0.0.1 specifically and thought they were done.<p>You should also usually block all internal and external IPs for your entire network, but especially in the cloud this can begin to get tricky. Still, you should.<p>And don&#x27;t forget IPv6.
评论 #10079554 未加载
评论 #10079556 未加载
评论 #10080507 未加载
评论 #10079596 未加载
评论 #10083001 未加载
评论 #10079984 未加载
评论 #10085836 未加载
mike-cardwellalmost 10 years ago
<a href="http:&#x2F;&#x2F;help.getpocket.com&#x2F;customer&#x2F;portal&#x2F;articles&#x2F;1225832-pocket-security-overview" rel="nofollow">http:&#x2F;&#x2F;help.getpocket.com&#x2F;customer&#x2F;portal&#x2F;articles&#x2F;1225832-p...</a><p>&quot;Pocket does not provide monetary compensation for any identified or possible vulnerability.&quot;<p>Cheapskates. This could have cost them money if somebody abusive had discovered it first. He deserves a monetary award.<p>[edit] Should we be concerned about the massive number of people listed on that page who have found security problems with Pocket? I counted 153 separate people...
评论 #10079317 未加载
评论 #10079415 未加载
评论 #10080518 未加载
评论 #10082591 未加载
评论 #10082962 未加载
评论 #10079252 未加载
评论 #10079242 未加载
skarapalmost 10 years ago
Yet another service discovered which was built&#x2F;deployed with no regard for security whatsoever. I&#x27;m beginning to realize - this is the norm. Security is the least important thing for most of the IT companies.<p>I guess the DevOps trend (i.e. not hiring sysadmins) should take it&#x27;s share of blame. Or maybe it&#x27;s the other way around - you don&#x27;t care for security, so there is no point in hiring security experts?
评论 #10081735 未加载
评论 #10082259 未加载
BenjaminWillalmost 10 years ago
Oh Mozilla, why couldn&#x27;t you resist the money. Your recent so called &quot;services&quot; are not welcome. You know it. But well, money makes the world go around.<p>How much did Telefonica pay you for the Hello integration?<p>But sure, our surfing history will be secure ...<p><a href="https:&#x2F;&#x2F;blog.mozilla.org&#x2F;advancingcontent&#x2F;2015&#x2F;05&#x2F;21&#x2F;providing-a-valuable-platform-for-advertisers-content-publishers-and-users&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.mozilla.org&#x2F;advancingcontent&#x2F;2015&#x2F;05&#x2F;21&#x2F;providi...</a><p>Did you guys acutally read your PR-bullshit here?<p>But soon a new small, fast, free, secure open-source browser will arrive and Mozilla will be history. But your pocket full. Well done.
评论 #10080290 未加载
评论 #10080647 未加载
评论 #10080062 未加载
评论 #10080042 未加载
评论 #10080267 未加载
cddotdotslashalmost 10 years ago
Really interesting write up! I&#x27;m surprised they are still running in EC2-Classic. However, even if they are, security groups should still be restrictive enough to prevent some of the things discussed. For example, bypassing the load balancer shouldn&#x27;t be possible. A security group applied to the back end instances should only allow HTTP&#x2F;S traffic from the load balancer group. SSH security groups should only allow inbound traffic from known IPs (like the office network), etc. Unfortunately, not enough people do this, and once you can query instance meta data or obtain an SSH key, it&#x27;s game over.
评论 #10080529 未加载
ddlathamalmost 10 years ago
If you were Pocket how would you handle the vulnerability created by having internal services hit user-supplied URLs?<p>Some ideas:<p>- Move the service doing the fetching to an untrusted network. At least it would be unable to access any internal services and any compromises there would be hopefully limited. You still have the problem that the local machines there could potentially be compromised.<p>- Validate &#x2F; verify the URL to ensure it&#x27;s not hitting anything internal. This sounds hard. Pre-resolve the name and check to see if the IP is in an internal range? Seems easy to get our of date as your network changes. Make sure to repeat for any redirects? Is there a better way to validate?<p>- Ensure that all internal services require authentication. This also sounds hard and easy to miss something.
评论 #10079750 未加载
评论 #10079630 未加载
评论 #10081622 未加载
评论 #10079849 未加载
pdkl95almost 10 years ago
This is the problem with services that store user information: it is highly probably that vulnerabilities like these exist. Security is rarely given the time and attention it requires.<p>I&#x27;m not trying to single out Pocket; they are just the latest evidence that even in the few cases where &quot;you can trust us with your data&quot; is said honestly, it isn&#x27;t a promise that can be kept in practice.
falcolasalmost 10 years ago
One more vulnerability which is possible when you can request an instance&#x27;s metadata: Any AMI roles which have been given to that instance (for example to enable S3 access or decrypt data using AWS&#x27; key service) would be visible.<p>These keys are rotated relatively frequently, but it opens up a whole new level of exploits against the company which runs those AWS servers.
schmichaelalmost 10 years ago
Is there a name for this sort of attack? We were just protecting against some similar attacks earlier this week, and it would have been nice to have a short name to refer to them as instead of &quot;that attack vector where we make unrestricted HTTP requests based on user input&quot;.
评论 #10080738 未加载
mrbig4545almost 10 years ago
running as root??? seriously?????
评论 #10079175 未加载
评论 #10079411 未加载
billyhoffmanalmost 10 years ago
I&#x27;m really not a fan of EC2 exposing instance meta data as a RESTful HTTP API running on Local-Link IP addresses. If its only supposed to be queried locally, why aren&#x27;t these just environment variables? Perhaps they are dynamic and that won&#x27;t work but come on!<p>At the very least, run it on localhost:10101 or something. Don&#x27;t give us another range to have to filter!
评论 #10080429 未加载
评论 #10079447 未加载
评论 #10082973 未加载
robn_fastmailalmost 10 years ago
If you want a laundry list of SSRF methods you should protect against, a great place to start is this slide deck from a talk at ONsec a couple of years ago:<p><a href="http:&#x2F;&#x2F;www.slideshare.net&#x2F;d0znpp&#x2F;ssrf-attacks-and-sockets-smorgasbord-of-vulnerabilities" rel="nofollow">http:&#x2F;&#x2F;www.slideshare.net&#x2F;d0znpp&#x2F;ssrf-attacks-and-sockets-sm...</a><p>Its thrilling and terrifying :)
hundtalmost 10 years ago
Security researchers out there: on what side of &quot;the line&quot; do you view this kind of exploitation to be? It was not done for nefarious purposes, but it did involve intentionally accessing resources that were clearly not intended to be accessed, like &#x2F;etc&#x2F;passwd. Would you worry if you did this that the company might call the police instead of thanking you?
halosghostalmost 10 years ago
The one thing I don&#x27;t like about this article (and indeed, much of the discourse around the Pocket integration) is its characterization of the Pocket integration itself. It calls it an “opt-out non-removable [extension]”. The truth is that you can easily disable it just as you can easily disable many other things that Firefox includes by-default. In fact, if you use Classic Theme Restorer (I use it not because I dislike australis, but because I really do not want a navigation toolbar), it has an option baked in to disable Pocket along with webrtc, et al.<p>Admittedly, I suppose it would be nice if Firefox actually packaged Pocket as a real extension that could be removed from the Extensions menu, but they have already integrated several things without using that schema.<p>I still use firefox, just with more and more things disabled, because none of the other browsers out there even come close to having what I need in a GUI browser (though, I would note that I&#x27;m evermore tempted to abandon GUI browsing altogether).<p>Either way, the write-up is great, and everything in the article other than that one characterization (which rubbed me a bit the wrong way in the wake of all the fevered discussions around the Pocket Integration) was a truly enjoyable read. Not to mention, it&#x27;s great that the Pocket devs fixed things quickly; that&#x27;s always a plus!
评论 #10079564 未加载
luxoriaalmost 10 years ago
&gt;Grab ssh private keys from autoprovisioned EC2 user’s home directory using 301 redirect to file URI (after all, we’re running as root, we can read them).<p>This is not a fair assumption to make. Maybe they are running a LSM like AppArmor.
评论 #10080348 未加载
_navaneethanalmost 10 years ago
You should receive some <i>gift</i> from pocket team :)
Iuzalmost 10 years ago
Is it ironic that I saved the article on pocket?
dafrankenstein2almost 10 years ago
i prefer using offline bookmark..specially the bookmark manager of Opera browser is impressive. ============================================= and for online bookmarking there is &#x27;raindrop.io&#x27;