What should password managers not do? Leak your passwords? What a great idea, LastPass

Critical bugs found in Chrome, Firefox add-ons

Updated Password vault LastPass is scrambling to patch critical security flaws that malicious websites can exploit to steal millions of victims' passphrases.

The programming cockups were spotted by Tavis Ormandy, a white-hat hacker on Google's crack Project Zero security team. He found that the LastPass Chrome extension has an exploitable content script that evil webpages can attack to extract usernames and passwords.

LastPass works by storing your passwords in the cloud. It provides browser extensions that connect to your LastPass account and automatically fill out your saved login details when you surf to your favorite sites.

However, due to the discovered vulnerabilities, simply browsing a malicious website is enough to hand over all your LastPass passphrases to strangers. The weak LastPass script uncovered by Ormandy can be tricked into granting access to the manager's internal mechanisms, which is rather bad news.

The script can also be abused to execute commands on the victim's computer – Ormandy demonstrated this by running calc.exe simply by opening a webpage. A malicious website could exploit this hole to drop malware on a visiting machine. A victim must have the binary component of LastPass installed to be vulnerable to this attack.

"This script will proxy unauthenticated window messages to the extension. This is clearly a mistake," Ormandy explained in a bug report today.

"This allows complete access to internal privileged LastPass RPC [remote procedure call] commands. There are hundreds of internal LastPass RPCs, but the obviously bad ones are things copying and filling in passwords (copypass, fillform, etc)."

All that's needed to exploit the vulnerability are two simple lines of JavaScript code, which Ormandy supplied:

win = window.open("https://1min-ui-prod.service.lastpass.com/");
win.postMessage({}, "*");

The password manager developer has experience with Ormandy after he found another flaw in its code last year that could compromise a punter's passwords just by visiting the wrong website.

"We greatly appreciate the work of the security community to challenge our product and uncover areas that need improvement," Joe Siegrist, cofounder and VP of LastPass, told The Register.

"We have made our LastPass community aware of the report made by Tavis Ormandy and have confirmed that the vulnerabilities have been fixed. We were notified early on – our team worked directly with Tavis to verify the report made, and worked quickly to issue the fix. As always, we recommend that users keep their software updated to the latest versions."

It appears LastPass's fix for the Chrome extension issue was to quickly disable 1min-ui-prod.service.lastpass.com – although some say the server is still working for them, so they are still vulnerable. That LastPass backend system resolves to for us right now, and is still up.

It's probably best to disable the Chrome extension until a version newer than 4.1.42, dated March 14, is sent out with an actual working fix.

And now its Firefox add-on

It has been a busy weekend for LastPass software engineers. Late last week, Ormandy found another LastPass vulnerability, this time in its Firefox extension. Again, the vulnerability can be exploited by malicious webpages to extract passwords from the manager.

That extension bug has been addressed, we're told, but the security patch won't be pushed out to people until the update is approved by Firefox-maker Mozilla. "The team has already issued a patch to fix [version] 3.3.2 and that updated version is currently in the Mozilla review process," a LastPass spokeswoman told us. She also said the 3.x branch of the add-on is being retired, and people should move onto the version 4.x family.

As we've said in the past, keep your password managers up to date. They're like any other software, and all software is exploitable. If you're a LastPass user, disable your Chrome and Firefox extensions until a fix is definitely available. ®

Stop press: Ormandy has found another password-leaking bug in LastPass for Firefox 4.1.35. That'll need patching, too. Or just dump LostPass and find other manager.

Updated to add on March 22

LastPass has put out an "incident report" that insists its browser extensions have been patched to squash the above reported bugs, and these builds are being pushed to users: check to see if you're running the latest version of LastPass on your computer, and update your extension if the software hasn't automatically fixed itself. LastPass has also made server-side changes to close the security holes.

You should be using LastPass version 4.1.36 with Firefox, with Chrome, 4.1.30 with Edge, and 4.1.28 with Opera. Note that the add-on maker is waiting for Microsoft and Opera to approve the updates from their browser extension stores, so the new builds may or may not be there right this second for those particular platforms. Check back later if they are not.

"Our investigation to date has not indicated that any sensitive user data was lost or compromised," LastPass added. "Our mobile apps for Android and iOS were not affected. No master password change is required. No site credential passwords need to be changed."

Other stories you might like

  • World’s smallest remote-controlled robots are smaller than a flea
    So small, you can't feel it crawl

    Video Robot boffins have revealed they've created a half-millimeter wide remote-controlled walking robot that resembles a crab, and hope it will one day perform tasks in tiny crevices.

    In a paper published in the journal Science Robotics , the boffins said they had in mind applications like minimally invasive surgery or manipulation of cells or tissue in biological research.

    With a round tick-like body and 10 protruding legs, the smaller-than-a-flea robot crab can bend, twist, crawl, walk, turn and even jump. The machines can move at an average speed of half their body length per second - a huge challenge at such a small scale, said the boffins.

    Continue reading
  • IBM-powered Mayflower robo-ship once again tries to cross Atlantic
    Whaddayaknow? It's made it more than halfway to America

    The autonomous Mayflower ship is making another attempt at a transatlantic journey from the UK to the US, after engineers hauled the vessel to port and fixed a technical glitch. 

    Built by ProMare, a non-profit organization focused on marine research, and IBM, the Mayflower set sail on April 28, beginning its over 3,000-mile voyage across the Atlantic Ocean. But after less than two weeks, the crewless ship broke down and was brought back to port in Horta in the Azores, 850 miles off the coast of Portugal, for engineers to inspect.

    With no humans onboard, the Mayflower Autonomous Ship (MAS) can only rely on its numerous cameras, sensors, equipment controllers, and various bits of hardware running machine-learning algorithms to survive. The computer-vision software helps it navigate through choppy waters and avoid objects that may be in its path.

    Continue reading
  • Revealed: The semi-secret list of techs Beijing really really wishes it didn't have to import
    I think we can all agree that China is not alone in wishing it had an alternative to Microsoft Windows

    China has identified "chokepoints" that leave it dependent on foreign countries for key technologies, and the US-based Center for Security and Emerging Technology (CSET) claims to have translated and published key document that name the technologies about which Beijing is most worried.

    CSET considered 35 articles published in Science and Technology Daily from April until July 2018. Each story detailed a different “chokepoint” or tech import dependency that China faces. The pieces are complete with insights from Chinese academics, industry insiders and other experts.

    CSET said the items, which offer a rare admission of economic and technological vulnerability , have hitherto “largely unnoticed in the non-Chinese speaking world.”

    Continue reading

Biting the hand that feeds IT © 1998–2022