Source: www.csoonline.com – Author:
SSL.com was mis-issuing SSL certificates by wrongly interpreting email addresses submitted for verification, allowing attackers to potentially impersonate brands and conduct data theft.
A flaw in SSL.com’s domain control validation (DCV) process allowed attackers to bypass verification and issue fraudulent SSL certificates for any domain linked to certain email providers.
According to an exploit demonstrated by a security researcher going by the alias Sec Reporter, attackers could abuse SSL.com’s misinterpretation of email-based validation methods.
“SSL.com failed to conduct accurate domain validation control when utilizing the BR 3.2.2.4.14 DCV method (Email to DNS TXT Contact),“ Sec Reporter said in a BugZilla post. ”It incorrectly marks the hostname of the approver’s email address as a verified domain, which is completely erroneous.“
SSL.com is a widely trusted certificate authority (CA) that issues SSL/TLS certificates–digital credentials that secure data transmitted between websites and users. A CA failing to properly check who owns a domain could allow issuance of fake certificates, leading to domain impersonation, data theft, man-in-the-middle, and phishing attacks.
SSL.com misvalidates random email addresses
SSL.com has a feature where one can prove they control a domain and get a TLS (SSL) certificate by creating a special DNS TXT record–an email address for SSL.com to send a confirmation code to.
In theory, only someone who controls the domain (like xyz@example.com) should be able to create this record and receive the verification email. However, in reality, SSL.com was mistakenly trusting just the domain part of the email address (example.com).
This allowed Sec Reporter to enter admin@aliyun.com as the record, and SSL.com assumed they controlled aliyun.com (a webmail service run by Alibaba), validating their certificates for aliyun.com and www.aliyun.com.
This is particularly dangerous as an attacker doesn’t need to have complete control over a website, e.g. google.com, to get a legitimate-looking certificate, as just the email address of an employee or even a free email address that’s somehow linked to the domain is enough.
Mis-issued certificates have been revoked
Sec Reporter’s demonstration of the flaw was acknowledged by SSL.com, and the issue was promptly fixed.
“SSL.com acknowledges this bug report and we are investigating further,” Rebecca Kelly, technical project manager at SSL.com, commented on the demonstration, quickly following with, “Out of an abundance of caution, we have disabled domain validation method 3.2.2.4.14 that was used in the bug report for all SSL/TLS certificates while we investigate.”
In a preliminary incident report attached in the comment section of the demonstration, it was revealed that a total of 10 certificates were mis-issued by SSL.com using the faulty method and were consequently revoked. These improperly issued certificates, with the exception of one, were found to be non-fraudulent mis-issuance upon investigation, Kelly added.
While CSO awaits response from SSL.com on the status of the one mis-issued certificate still not in the clear, major websites, including email and cloud providers, are advised to cross-check the entire list of mis-issued certificates to be extra vigilant.
SUBSCRIBE TO OUR NEWSLETTER
From our editors straight to your inbox
Get started by entering your email address below.
Original Post url: https://www.csoonline.com/article/3968277/attackers-abused-a-bug-within-ssl-com-to-authorize-fake-certificates.html
Category & Tags: Security, Vulnerabilities – Security, Vulnerabilities
Views: 1