Question

I've heard from a friend that the WWW-Authenticate header can be explicitly defined within a malicious php file on a remote server and use an image mimetype e.g. image/jpeg or image/png.

Hypothetical Situation

Say this file is malicious.com/image.php and I add this image to my forum signature on some arbitrary forum. Specifically, gaiaonline.com. When another visitor visits a thread with my post on it, they'll see the login prompt given by the WWW-Authenticate header. After the visitor/victim has input their username/password, the hacker can store it on their remote server, email it to themselves, etc.

Malicious code: <img src="malicious.com/image.php" /> containing WWW-Authenticate header. Can be input through standard posting/BBcode.

How can this be fixed? I would think that a cross-domain access is available for this.

Was it helpful?

Solution

It can't be "fixed" except by disallowing any external images (e.g. by proxying them through your server so users never hit the real URL).

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top