A penetration testing company uncovered security vulnerabilities on the NASDAQ website that remained open for two weeks after the stock exchange was notified.
The vulnerabilities were uncovered by Geneva-based High Tech Bridge, and have now been patched.
“I initially reported one XSS [cross-site scripting] and one open redirect, which I found in about 10 minutes,” High-Tech Bridge CEO Ilia Kolochenko told SecurityWeek in an email. “I didn’t want to dig further without their permission as it would be unethical, but I am pretty sure they have other vulnerabilities, probably even more dangerous than XSS.”
Cross-site scripting allows attackers to inject client-side script into Web pages, and is one of the most common vulnerabilities on the Web. If exploited, the vulnerabilities could have had a number of implications for anyone who visited the NASDAQ site, including the theft of browser cookies and phishing attacks where users are tricked into giving up personal details by what appear to be legitimate requests from Nasdaq.
Criticizing NASDAQ for its response, Kolochenko said he contacted NASDAQ about the issue Sept. 2 but never heard back, and added that the issues were not patched until the incident received media coverage Sept. 16.
“They were notified on the 2nd of September 2013 by an email sent to a dozen of addresses found on their website, as well as to some “generic” emails like [email protected] and [email protected],” he said. “What is actually surprising is that they don’t have a contact to “Report website issue”, not even speaking about “Report security bug”. Hopefully, now they will become more open now.”
The incident is unrelated to a software glitch and other technical problems that caused a three-hour outage in late August that temporarily halted trading. In an interview with SecurityWeek, a NASDAQ spokesperson said that all matters related to security are taken very seriously by Nasdaq.
“We work with leading security vendors, and have a trained and professional team that evaluates all credible threats across all of our digital assets,” he said.
To prevent cross-site scripting vulnerabilities, the Open Web Application Security Project (OWASP) recommends developers properly escape all untrusted data based on the HTML context the data will be placed into.
“Strict source code review policy should be applied to any script that is publicly accessible. Security should become an essential part of SDLC,” said Kolochenko. “Today many web developers simply forget about application security being focused mainly on productivity, compatibility, SEO, SMO, etc.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
