Jump to content

[UPDATED] LastPass vulnerability (make sure it's up to date)

colonel_mortis

Source: https://labs.detectify.com/2016/07/27/how-i-made-lastpass-give-me-all-your-passwords/

For update: https://blog.lastpass.com/2016/07/lastpass-security-updates.html/

 

If you use LastPass, please make sure it's up to date (though the vulnerability appears to have been fixed a while ago) if you use Firefox, action is required. See below for details

Quote

By browsing this URL: http://avlidienbrunn.se/@twitter.com/@hehe.php the browser would treat the current domain as avlidienbrunn.se while the extension would treat it as twitter.com. Since the code only URL encodes the last occurence of @, the actual domain is treated as the username portion of the URL.

The attack then involved adding form fields to the page so that they would be autofilled by the extension, and the contents can then be extracted using a script running on the page.

Lastpass.jpg

The vulnerability has been patched by LastPass, but obviously the fact that it exists at all is concerning.

To prevent any autofill vulnerabilities from affecting you in future, you can disable autofilling the fields (you click a button instead) in your LastPass settings.

 

== UPDATE ==

LastPass has now published a blog post explaining this issue, as well as disclosing a new critical vulnerability that affects users of the Firefox version of the addon. If you are using Firefox, you urgently need to update the extension from https://lastpass.com/lastpassffx

This vulnerability was reported to LastPass by Google security researcher Tavis Ormandy yesterday, and the update was released a few hours ago. The full details of the exploit have not yet been disclosed, but it was described as a "message-hijacking bug". To understand what that means, you need to understand how a browser extension like LastPass works - a script runs inside a sandbox with access to the page, but no access to any of the extension's settings or private data ("content script"), while another script runs with no access to the web content but with access to all of the private data, settings, etc ("main script"). The two scripts communicate by sending messages to one another, allowing the web script to get data from the main script, and to modify settings/private data/etc.

This vulnerability means that a malicious website can cause arbitrary messages to be sent from the content script to the main script, allowing the malicious website to get your passwords or modify the contents of your vault.

Thanks to @lubblig for notifying me about the update.

Edited by colonel_mortis

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

Yikes.  That is very concerning.  Another reason to make sure all your various logins have a unique password I guess, and keep the master password very secure.

i7 4790k @4.7 | GTX 1070 Strix | Z97 Sabertooth | 32GB  DDR3 2400 mhz | Intel 750 SSD | Define R5 | Corsair K70 | Steel Series Rival | XB271, 1440p, IPS, 165hz | 5.1 Surround
PC Build

Desk Build

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, CostcoSamples said:

Yikes.  That is very concerning.  Another reason to make sure all your various logins have a unique password I guess, and keep the master password very secure.

That is obviously a really good practice, but in this particular case it wouldn't have helped.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

DSC00526.JPG

my keepass file is kept very secure, i have nothing to worry about :P

 

joking aside, (yes, thats actually where my keepass file is, btw.) that is a very, very worrying thing to have existed.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, manikyath said:

-pic snip-

my keepass file is kept very secure, i have nothing to worry about :P

 

joking aside, (yes, thats actually where my keepass file is, btw.) that is a very, very worrying thing to have existed.

I should get one of those.... I have a bunch of 3.5" floppies sitting in a case on my shelf.

END OF LINE

-- Project Deep Freeze Build Log --

Quote me so that I always know when you reply, feel free to snip if the quote is long. May your FPS be high and your temperatures low.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, DevilishBooster said:

I should get one of those.... I have a bunch of 3.5" floppies sitting in a case on my shelf.

takes a year and a half for keepass to load the database tho :P

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, manikyath said:

takes a year and a half for keepass to load the database tho :P

Doesn't matter, still secure.

END OF LINE

-- Project Deep Freeze Build Log --

Quote me so that I always know when you reply, feel free to snip if the quote is long. May your FPS be high and your temperatures low.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, DevilishBooster said:

Doesn't matter, still secure.

well, they can steal your passwords, but its not like they're gonna be able to even get the file off of the floppy in the first place xD

Link to comment
Share on other sites

Link to post
Share on other sites

17 minutes ago, manikyath said:

well, they can steal your passwords, but its not like they're gonna be able to even get the file off of the floppy in the first place xD

They don't copy that floppy.

My Build:

Spoiler

CPU: i7 4770k GPU: GTX 780 Direct CUII Motherboard: Asus Maximus VI Hero SSD: 840 EVO 250GB HDD: 2xSeagate 2 TB PSU: EVGA Supernova G2 650W

Link to comment
Share on other sites

Link to post
Share on other sites

Step 1: Enable 2FA on everything you can

Step 2: Use some unique passwords. That's the point of a password manager, right?

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Qub3d said:

Step 1: Enable 2FA on everything you can

Step 2: Use some unique passwords. That's the point of a password manager, right?

Until 2 factor authentication is deemed insecure: http://www.techspot.com/news/65728-sms-based-two-factor-authentication-phased-out.html

PSU Tier List | CoC

Gaming Build | FreeNAS Server

Spoiler

i5-4690k || Seidon 240m || GTX780 ACX || MSI Z97s SLI Plus || 8GB 2400mhz || 250GB 840 Evo || 1TB WD Blue || H440 (Black/Blue) || Windows 10 Pro || Dell P2414H & BenQ XL2411Z || Ducky Shine Mini || Logitech G502 Proteus Core

Spoiler

FreeNAS 9.3 - Stable || Xeon E3 1230v2 || Supermicro X9SCM-F || 32GB Crucial ECC DDR3 || 3x4TB WD Red (JBOD) || SYBA SI-PEX40064 sata controller || Corsair CX500m || NZXT Source 210.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, djdwosk97 said:

SMS-based 2FA. Use Google Authenticator.

F#$k timezone programming. Use UTC! (See XKCD #1883)

PC Specs:

Ryzen 5900x, MSI 3070Ti, 2 x 1 TiB SSDs, 32 GB 3400 DDR4, Cooler Master NR200P

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

18 minutes ago, djdwosk97 said:

It's still more secure to have a password AND 2FA than just a password. The two aren't mutually exclusive.

My Build:

Spoiler

CPU: i7 4770k GPU: GTX 780 Direct CUII Motherboard: Asus Maximus VI Hero SSD: 840 EVO 250GB HDD: 2xSeagate 2 TB PSU: EVGA Supernova G2 650W

Link to comment
Share on other sites

Link to post
Share on other sites

Seems like there is another bug in LastPass, although this one has yet to be patched. It's a Zero day exploit that allegedly enables a remote hacker to completely compromise a Lastpass account

Quote

A critical zero-day flaw has been discovered in the popular cloud password manager LastPass that could allow any remote attacker to compromise your account completely.

So far there aren't really any proof as far as I can tell, only a security expert claiming the fact. Although it's the Google employee (Project Zero team), Tavis Ormandy, who made the report and has reported the bug to Lastpass, so it's likely not a hoax. Since it has just been found out though, the "how it was done", has yet to be released for Lastpass to have time to patch it.

Source: http://thehackernews.com/2016/07/lastpass-password-manager.html

 

@colonel_mortis You may want to update the OP or make a new post (I thought I'd just leave a comment as you are probably better at explaining the situation than I am)

 

EDIT: It seems Lastpass has fixed the issue and an update is available. Read the OP for more details.

Spoiler

System:

i5 3570k @ 4.4 GHz, MSI Z77A-G43, Dominator Platinum 1600MHz 16GB (2x8GB), EVGA GTX 980ti 6GB, CM HAF XM, Samsung 850 Pro 256GB + Some WD Red HDD, Corsair RM850 80+ Gold, Asus Xonar Essence STX, Windows 10 Pro 64bit

PCPP:

http://pcpartpicker.com/p/znZqcf

 

Link to comment
Share on other sites

Link to post
Share on other sites

Oh, good it's up to date.

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

Why even store passwords exactly?? I cant imagine giving someone a possible single point of entry into all of my accounts. 

CPU: Amd 7800X3D | GPU: AMD 7900XTX

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, goodtofufriday said:

Why even store passwords exactly?? I cant imagine giving someone a possible single point of entry into all of my accounts. 

Because the alternative is to reuse the same password on multiple sites, so if one of them gets hacked, all the other accounts on other sites get compromised too. And no, using a variant of the password depending on the site (eg p@ssw0rd-facebook for facebook and p@ssw0rd-twitter for twitter) is barely more secure, because attackers have learnt to expect it.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, colonel_mortis said:

Because the alternative is to reuse the same password on multiple sites, so if one of them gets hacked, all the other accounts on other sites get compromised too. And no, using a variant of the password depending on the site (eg p@ssw0rd-facebook for facebook and p@ssw0rd-twitter for twitter) is barely more secure, because attackers have learnt to expect it.

I personally have 7 different passwords that I've memorized and rotate through. Occasionally I'll retire one after its been some time. This would be the best alternative, but I guess we cant ask most people to do that.

CPU: Amd 7800X3D | GPU: AMD 7900XTX

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, goodtofufriday said:

I personally have 7 different passwords that I've memorized and rotate through. Occasionally I'll retire one after its been some time. This would be the best alternative, but I guess we cant ask most people to do that.

I did that before as well, but then one website got hacked into, account info got leaked, suddenly I had to change the same password used on that I had to reuse on others services(20+). Because you will run out of unique passwords very quickly and I ain't about to remember 87+ unique passwords (according to keepass)

So now I really only need to remember a single very strong password and make sure I don't have a keylogger on my PC. (Though a certain feature of Keepass also protects your main password from that while entering it)

CPU: AMD Ryzen 3700x / GPU: Asus Radeon RX 6750XT OC 12GB / RAM: Corsair Vengeance LPX 2x8GB DDR4-3200
MOBO: MSI B450m Gaming Plus / NVME: Corsair MP510 240GB / Case: TT Core v21 / PSU: Seasonic 750W / OS: Win 10 Pro

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×