Hi,

It appears AlwaysOnSSL is not completely disabled - if we trust CT as
a timestamping service, [1] was issued after Hanno's email.

I believe AlwaysOnSSL has at least two separate paths to issuance - in
addition to the website, there's also an API on CertCenter's website.
[2] While reading the API docs, I noticed a "generatePrivateKey"
option; a quick read of their client API example code indicates
CertCenter is generating keys server-side for their customers. I had
hoped that after the Trustico debacle resellers would have
discontinued this practice.

While I welcome the availability of free and low-cost certificates, I
share Hanno's concern about CertCenter/AlwaysOnSSL.

Alex

[1] https://crt.sh/?id=1097197338
[2] https://api.certcenter.help/docs/tutorial-integrate-alwaysonssl

On Wed, Jan 9, 2019 at 8:59 AM Hanno Böck via dev-security-policy
<[email protected]> wrote:
>
> Hi,
>
> AlwaysOnSSL was a free certificate authority operated by CertCenter.
> I recently noticed that their main webpage was gone, but pieces of the
> service were still online.
> I immediately found a few web security issues. I reported those to
> certcenter and digicert (which is the root CA their intermediate chains
> to).
>
> This is what I reported:
>
> Partly disfuctional
> ===================
>
> The service seems to be partly disfunctional. The start page is just
> showing an empty document.
>
> However when directly calling subpages, e.g.
> https://alwaysonssl.com/issue.php
> there still seems to be an operational service.
>
> This looks to me like AlwaysOnSSL is not actively maintained.
>
> XSS
> ===
>
> The certificate issuance form has a trivial injection issue. Simply
> putting something like ">test<h1> will inject HTML. CSP+XSS Auditor
> prevent this from being a simple XSS, but I'm pretty sure this can be
> bypassed with enough effort.
>
> CSRF
> ====
>
> The forms don't seem to contain any CSRF tokens. I haven't analyzed
> this in detail, but I believe this likely means an attacker can
> interfere with the issuance process and may be able to inject his own
> CSR and forge a certificate.
>
> Account management
> ==================
>
> I have an existing account for alwaysonssl.com from previous tests.
> There seems to be no way of either deleting the account or changing the
> password. I consider not offering a password changing option a security
> problem as well.
>
>
> I believe all of these issues show that alwaysonssl.com is an
> unmaintained, partly broken service with a total lack of secure coding
> practice, yet it's able to issue valid certificates that chain down to
> a digicert root.
>
> -----------------
>
>
> In response to this the service was completely disabled.
>
> In one of the response mails CertCenter wrote me:
> "Among other things, we operate a web application firewall that
> prevent requests when it detects dangerous data. An XSS request like
> the one you carried out apparently did not consider the WAF to be
> relevant."
>
> This IMHO shows a serious lack of knowledge about web security basics
> and an undeserved trust in WAFs. (The WAF filter was easily bypassable,
> they also had a CSP which I believe was bypassable, too, but they
> switched the service off before I could show that.)
>
> Given the service is switched off now I think there's nothing
> particularly to do, but maybe it's a reminder to have a closer look at
> the security of CA issuance web systems.
>
> --
> Hanno Böck
> https://hboeck.de/
>
> mail/jabber: [email protected]
> GPG: FE73757FA60E4E21B937579FA5880072BBB51E42
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to