Code Monkey home page Code Monkey logo

Comments (6)

EdisK avatar EdisK commented on May 30, 2024

Actually I tend to agree with the @EgiX , we probably should mark it as p5 for a consistent triaging process. The chrome fully mitigates this issue, and it'd be really hard to trick the user to write the credentials in firefox, given that it clearly shows testtest.com is requesting your name and password. It even shows a warning message, so this could be considered as an accepted risk in my opinion and the client should have the right to not pay for it.
Happy to hear others thoughts.

from vulnerability-rating-taxonomy.

plr0man avatar plr0man commented on May 30, 2024

There's still a good phishing potential in Safari and IE as I see in @EgiX's examples. Let's consider that the attacker is capable of injecting HTTP authentication into bugcrowd.com. Assuming that the attacker controls buqcrowd.com (q instead of g or something similar) and the victim is using Safari or IE the prompt will say something along these lines: "Login on buqcrowd.com:80 - Password will be sent in clear". That is still a valid issue. Also lets not underestimate how users ignore dialog messages, which would be a good enough risk factor in Firefox.

I do feel that this is more a P5 than P4 because it is often a feature to allow the users to paste image tags. Since there's no trivial fix (correct me if I'm wrong here) this kind of issues would be see as won't fix by the clients. The mitigation would be not so much disabling this type of features but monitoring abuse.

from vulnerability-rating-taxonomy.

shpendk avatar shpendk commented on May 30, 2024

My vote goes for P5. Yes you get prompted, but most users will click away, and the ones that don't will probably read instead of blindly typing their password anywhere

from vulnerability-rating-taxonomy.

plr0man avatar plr0man commented on May 30, 2024

This is what the victim will see in Safari (my actual screenshot) and IE (potentially) if the malicious server uses HTTPS (domain masked by me as it's not important) :
screen shot 2017-06-09 at 7 43 28 pm
It is not a matter of 'if', but rather how many user accounts will get compromised. Let's look back at the historical data for this type of issues and see if they present any value to the customers before we take any steps.

from vulnerability-rating-taxonomy.

shipcod3 avatar shipcod3 commented on May 30, 2024

I agree that it needs to be downgraded with P5. It's also like Content Spoofing. Based on what @EdisK said that it has been mitigated in Chrome then that's a good point too.

from vulnerability-rating-taxonomy.

plr0man avatar plr0man commented on May 30, 2024

Closing this Issue as agreed during today's vulnerability roundtable

from vulnerability-rating-taxonomy.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.