Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. clipboard exploit

clipboard exploit

Scheduled Pinned Locked Moved The Lounge
javascriptphpdatabasecomsecurity
13 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    Stephane Rodriguez
    wrote on last edited by
    #1

    I wondered what were the reasons Microsoft implemented copy/paste clipboard methods in JScript to be used in Internet Explorer rendered web pages. May be Microsoft integrated a bit too much the browser with the OS. After all, to me it's much like a security hole. This allows thefts to steal personal content. Clipboard content has often email adresses or other confidential information being carried. As such, it could do a lot of harm to victims. The issue arises when the victim shapes as virtually everyone surfing the web using Internet Explorer. And yet, we are not dealing with things like cross-site scripting or spoofed inter-frame access, which have been patched a while ago already (the best to do at this point is to make sure to download the latest browser version, and uncheck all ActiveX scripting boxes from the security tab). No. What I got running first locally, and then throughout my website, turned out to be the ability to steal the current clipboard content of visitors' computers without their consent. Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. I couldn't believe my eyes. But that was only the premise of it. It required 5 lines of javascript code, and a trigger, and all of this can be done silently while the surfer is browsing, regardless of his security level. What is giving me some sweat is that, actually, I believe the same could be done with a single javascripted url, like when you have an anchor executing inline code instead of an url. For instance, in message posts. Suddenly, it became apparent to me that all boards, not only CodeProject of course, were at threat and that nasty minds could really take advantage of the audience WITHOUT BEING SEEN. Not new probably, possible since Internet Explorer 4.0, but probably worth being reminded. [Edit]In case you wondered, this post is safe to click on.[/Edit]

    K M M C 4 Replies Last reply
    0
    • S Stephane Rodriguez

      I wondered what were the reasons Microsoft implemented copy/paste clipboard methods in JScript to be used in Internet Explorer rendered web pages. May be Microsoft integrated a bit too much the browser with the OS. After all, to me it's much like a security hole. This allows thefts to steal personal content. Clipboard content has often email adresses or other confidential information being carried. As such, it could do a lot of harm to victims. The issue arises when the victim shapes as virtually everyone surfing the web using Internet Explorer. And yet, we are not dealing with things like cross-site scripting or spoofed inter-frame access, which have been patched a while ago already (the best to do at this point is to make sure to download the latest browser version, and uncheck all ActiveX scripting boxes from the security tab). No. What I got running first locally, and then throughout my website, turned out to be the ability to steal the current clipboard content of visitors' computers without their consent. Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. I couldn't believe my eyes. But that was only the premise of it. It required 5 lines of javascript code, and a trigger, and all of this can be done silently while the surfer is browsing, regardless of his security level. What is giving me some sweat is that, actually, I believe the same could be done with a single javascripted url, like when you have an anchor executing inline code instead of an url. For instance, in message posts. Suddenly, it became apparent to me that all boards, not only CodeProject of course, were at threat and that nasty minds could really take advantage of the audience WITHOUT BEING SEEN. Not new probably, possible since Internet Explorer 4.0, but probably worth being reminded. [Edit]In case you wondered, this post is safe to click on.[/Edit]

      K Offline
      K Offline
      KaRl
      wrote on last edited by
      #2

      Javascript is hell! :-D


      We do not inherit the Earth from our ancestors, we borrow it from our children - Antoine de Saint-Exupéry (1900-1944)

      S 1 Reply Last reply
      0
      • S Stephane Rodriguez

        I wondered what were the reasons Microsoft implemented copy/paste clipboard methods in JScript to be used in Internet Explorer rendered web pages. May be Microsoft integrated a bit too much the browser with the OS. After all, to me it's much like a security hole. This allows thefts to steal personal content. Clipboard content has often email adresses or other confidential information being carried. As such, it could do a lot of harm to victims. The issue arises when the victim shapes as virtually everyone surfing the web using Internet Explorer. And yet, we are not dealing with things like cross-site scripting or spoofed inter-frame access, which have been patched a while ago already (the best to do at this point is to make sure to download the latest browser version, and uncheck all ActiveX scripting boxes from the security tab). No. What I got running first locally, and then throughout my website, turned out to be the ability to steal the current clipboard content of visitors' computers without their consent. Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. I couldn't believe my eyes. But that was only the premise of it. It required 5 lines of javascript code, and a trigger, and all of this can be done silently while the surfer is browsing, regardless of his security level. What is giving me some sweat is that, actually, I believe the same could be done with a single javascripted url, like when you have an anchor executing inline code instead of an url. For instance, in message posts. Suddenly, it became apparent to me that all boards, not only CodeProject of course, were at threat and that nasty minds could really take advantage of the audience WITHOUT BEING SEEN. Not new probably, possible since Internet Explorer 4.0, but probably worth being reminded. [Edit]In case you wondered, this post is safe to click on.[/Edit]

        M Offline
        M Offline
        Michael Dunn
        wrote on last edited by
        #3

        Just FYI, you can disable copy/paste via script, although it's tough to find. IE Options->Security->Custom Level->scroll down to Scripting section->Allow paste operations via script The only web site I've ever seen mess with the clipboard is tinyurl.com[^] [nn,ws] which is innocuous but I don't like anyone messing with the clipboard, since it's an irreversible operation. :mad: --Mike-- "I'm working really, really fast at the moment, so a 3 minute outage becomes, due to time dilation, a 5 minute outage." -- Chris Maunder, relativistic system administrator Ericahist | Homepage | RightClick-Encrypt | 1ClickPicGrabber

        S L 3 Replies Last reply
        0
        • K KaRl

          Javascript is hell! :-D


          We do not inherit the Earth from our ancestors, we borrow it from our children - Antoine de Saint-Exupéry (1900-1944)

          S Offline
          S Offline
          Stephane Rodriguez
          wrote on last edited by
          #4

          To be accurate, copy/paste is not part of ECMA Javascript. It is really originated by the MS JScript implementation.

          1 Reply Last reply
          0
          • M Michael Dunn

            Just FYI, you can disable copy/paste via script, although it's tough to find. IE Options->Security->Custom Level->scroll down to Scripting section->Allow paste operations via script The only web site I've ever seen mess with the clipboard is tinyurl.com[^] [nn,ws] which is innocuous but I don't like anyone messing with the clipboard, since it's an irreversible operation. :mad: --Mike-- "I'm working really, really fast at the moment, so a 3 minute outage becomes, due to time dilation, a 5 minute outage." -- Chris Maunder, relativistic system administrator Ericahist | Homepage | RightClick-Encrypt | 1ClickPicGrabber

            S Offline
            S Offline
            Stephane Rodriguez
            wrote on last edited by
            #5

            Thanks voter! :-)

            1 Reply Last reply
            0
            • S Stephane Rodriguez

              I wondered what were the reasons Microsoft implemented copy/paste clipboard methods in JScript to be used in Internet Explorer rendered web pages. May be Microsoft integrated a bit too much the browser with the OS. After all, to me it's much like a security hole. This allows thefts to steal personal content. Clipboard content has often email adresses or other confidential information being carried. As such, it could do a lot of harm to victims. The issue arises when the victim shapes as virtually everyone surfing the web using Internet Explorer. And yet, we are not dealing with things like cross-site scripting or spoofed inter-frame access, which have been patched a while ago already (the best to do at this point is to make sure to download the latest browser version, and uncheck all ActiveX scripting boxes from the security tab). No. What I got running first locally, and then throughout my website, turned out to be the ability to steal the current clipboard content of visitors' computers without their consent. Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. I couldn't believe my eyes. But that was only the premise of it. It required 5 lines of javascript code, and a trigger, and all of this can be done silently while the surfer is browsing, regardless of his security level. What is giving me some sweat is that, actually, I believe the same could be done with a single javascripted url, like when you have an anchor executing inline code instead of an url. For instance, in message posts. Suddenly, it became apparent to me that all boards, not only CodeProject of course, were at threat and that nasty minds could really take advantage of the audience WITHOUT BEING SEEN. Not new probably, possible since Internet Explorer 4.0, but probably worth being reminded. [Edit]In case you wondered, this post is safe to click on.[/Edit]

              M Offline
              M Offline
              Member 96
              wrote on last edited by
              #6

              I think you've pointed out a a very legit risk because lot's of people save all their passwords etc in a text file and copy and paste them into a website. For example, we have online banking and it's much easier to copy and paste those long numbers rather than typing them. I know that's probably not a good idea all around to save all the passwords in a text file, but I have probably over 300 now and I'm too lazy to write a password database program. I'm disabling it now, thanks for the head's up. ------------

              S 1 Reply Last reply
              0
              • M Michael Dunn

                Just FYI, you can disable copy/paste via script, although it's tough to find. IE Options->Security->Custom Level->scroll down to Scripting section->Allow paste operations via script The only web site I've ever seen mess with the clipboard is tinyurl.com[^] [nn,ws] which is innocuous but I don't like anyone messing with the clipboard, since it's an irreversible operation. :mad: --Mike-- "I'm working really, really fast at the moment, so a 3 minute outage becomes, due to time dilation, a 5 minute outage." -- Chris Maunder, relativistic system administrator Ericahist | Homepage | RightClick-Encrypt | 1ClickPicGrabber

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #7

                Thanks for that - just disabled it :) Paul ;)

                That's better! It looks like radioactive waste now. - Ryan Binns

                1 Reply Last reply
                0
                • M Michael Dunn

                  Just FYI, you can disable copy/paste via script, although it's tough to find. IE Options->Security->Custom Level->scroll down to Scripting section->Allow paste operations via script The only web site I've ever seen mess with the clipboard is tinyurl.com[^] [nn,ws] which is innocuous but I don't like anyone messing with the clipboard, since it's an irreversible operation. :mad: --Mike-- "I'm working really, really fast at the moment, so a 3 minute outage becomes, due to time dilation, a 5 minute outage." -- Chris Maunder, relativistic system administrator Ericahist | Homepage | RightClick-Encrypt | 1ClickPicGrabber

                  S Offline
                  S Offline
                  Stephane Rodriguez
                  wrote on last edited by
                  #8

                  Michael Dunn wrote: The only web site I've ever seen mess with the clipboard The point is : webmasters could do this if they want, but the situation is anyone posting on the board could add inline script in their posts, signature or whatever might actually get published. While apparently only a few sites use it (who knows?), admittedly subscribers would immediately resign if they knew such thing was being done, the threat is much greater in scale since it questions the ability to safely read board posts.

                  A 1 Reply Last reply
                  0
                  • M Member 96

                    I think you've pointed out a a very legit risk because lot's of people save all their passwords etc in a text file and copy and paste them into a website. For example, we have online banking and it's much easier to copy and paste those long numbers rather than typing them. I know that's probably not a good idea all around to save all the passwords in a text file, but I have probably over 300 now and I'm too lazy to write a password database program. I'm disabling it now, thanks for the head's up. ------------

                    S Offline
                    S Offline
                    Stephane Rodriguez
                    wrote on last edited by
                    #9

                    Nobody cares about the clipboard, because it is so hidden underneath. But the truth is, as you said, virtually everything gets through it. The additional point about clipboard content theft is that in my php page redirection I also log the referrer and the query string, which gives an amazing amount of qualified information. Last point, the issue is not about webmasters who would deliberately do this. The issue is about people who would post messages with such script embedded in their posts. As such, there are ways to make sure the script gets activated anytime a reader gets the page. Hope this clarifies the situation.

                    1 Reply Last reply
                    0
                    • S Stephane Rodriguez

                      Michael Dunn wrote: The only web site I've ever seen mess with the clipboard The point is : webmasters could do this if they want, but the situation is anyone posting on the board could add inline script in their posts, signature or whatever might actually get published. While apparently only a few sites use it (who knows?), admittedly subscribers would immediately resign if they knew such thing was being done, the threat is much greater in scale since it questions the ability to safely read board posts.

                      A Offline
                      A Offline
                      Anders Molin
                      wrote on last edited by
                      #10

                      Stephane Rodriguez. wrote: but the situation is anyone posting on the board could add inline script in their posts, signature or whatever might actually get published. Not on this board, AFAIK scripts are removed from posts ;) - Anders Money talks, but all mine ever says is "Goodbye!"

                      S 1 Reply Last reply
                      0
                      • A Anders Molin

                        Stephane Rodriguez. wrote: but the situation is anyone posting on the board could add inline script in their posts, signature or whatever might actually get published. Not on this board, AFAIK scripts are removed from posts ;) - Anders Money talks, but all mine ever says is "Goodbye!"

                        S Offline
                        S Offline
                        Stephane Rodriguez
                        wrote on last edited by
                        #11

                        Anders Molin wrote: Not on this board, AFAIK scripts are removed from posts I'll let readers decide by themselves whether it's impossible to have script activated by using board posts.

                        1 Reply Last reply
                        0
                        • S Stephane Rodriguez

                          I wondered what were the reasons Microsoft implemented copy/paste clipboard methods in JScript to be used in Internet Explorer rendered web pages. May be Microsoft integrated a bit too much the browser with the OS. After all, to me it's much like a security hole. This allows thefts to steal personal content. Clipboard content has often email adresses or other confidential information being carried. As such, it could do a lot of harm to victims. The issue arises when the victim shapes as virtually everyone surfing the web using Internet Explorer. And yet, we are not dealing with things like cross-site scripting or spoofed inter-frame access, which have been patched a while ago already (the best to do at this point is to make sure to download the latest browser version, and uncheck all ActiveX scripting boxes from the security tab). No. What I got running first locally, and then throughout my website, turned out to be the ability to steal the current clipboard content of visitors' computers without their consent. Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. I couldn't believe my eyes. But that was only the premise of it. It required 5 lines of javascript code, and a trigger, and all of this can be done silently while the surfer is browsing, regardless of his security level. What is giving me some sweat is that, actually, I believe the same could be done with a single javascripted url, like when you have an anchor executing inline code instead of an url. For instance, in message posts. Suddenly, it became apparent to me that all boards, not only CodeProject of course, were at threat and that nasty minds could really take advantage of the audience WITHOUT BEING SEEN. Not new probably, possible since Internet Explorer 4.0, but probably worth being reminded. [Edit]In case you wondered, this post is safe to click on.[/Edit]

                          C Offline
                          C Offline
                          Chris Maunder
                          wrote on last edited by
                          #12

                          Stephane Rodriguez. wrote: Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. Only if you give the site your email address to begin with. cheers, Chris Maunder

                          S 1 Reply Last reply
                          0
                          • C Chris Maunder

                            Stephane Rodriguez. wrote: Technically, the content is automatically redirected to a target php script page where it is used to make an email, sent back to me. Only if you give the site your email address to begin with. cheers, Chris Maunder

                            S Offline
                            S Offline
                            Stephane Rodriguez
                            wrote on last edited by
                            #13

                            Yeah, the target page is hosted by my very site. I have no real trouble giving an address to send the emails to.

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups