Hi, AlwaysOnSSL was a free certificate authority operated by CertCenter. I recently noticed that their main webpage was gone, but pieces of the service were still online. I immediately found a few web security issues. I reported those to certcenter and digicert (which is the root CA their intermediate chains to).
This is what I reported: Partly disfuctional =================== The service seems to be partly disfunctional. The start page is just showing an empty document. However when directly calling subpages, e.g. https://alwaysonssl.com/issue.php there still seems to be an operational service. This looks to me like AlwaysOnSSL is not actively maintained. XSS === The certificate issuance form has a trivial injection issue. Simply putting something like ">test<h1> will inject HTML. CSP+XSS Auditor prevent this from being a simple XSS, but I'm pretty sure this can be bypassed with enough effort. CSRF ==== The forms don't seem to contain any CSRF tokens. I haven't analyzed this in detail, but I believe this likely means an attacker can interfere with the issuance process and may be able to inject his own CSR and forge a certificate. Account management ================== I have an existing account for alwaysonssl.com from previous tests. There seems to be no way of either deleting the account or changing the password. I consider not offering a password changing option a security problem as well. I believe all of these issues show that alwaysonssl.com is an unmaintained, partly broken service with a total lack of secure coding practice, yet it's able to issue valid certificates that chain down to a digicert root. ----------------- In response to this the service was completely disabled. In one of the response mails CertCenter wrote me: "Among other things, we operate a web application firewall that prevent requests when it detects dangerous data. An XSS request like the one you carried out apparently did not consider the WAF to be relevant." This IMHO shows a serious lack of knowledge about web security basics and an undeserved trust in WAFs. (The WAF filter was easily bypassable, they also had a CSP which I believe was bypassable, too, but they switched the service off before I could show that.) Given the service is switched off now I think there's nothing particularly to do, but maybe it's a reminder to have a closer look at the security of CA issuance web systems. -- Hanno Böck https://hboeck.de/ mail/jabber: [email protected] GPG: FE73757FA60E4E21B937579FA5880072BBB51E42 _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

