OpenID security issues

Background

I contacted MyOpenID about a vulnerability I found with their system, I was really impressed with these guys, they responded to my email in a day and within 2 days they had fixed the problem. I decided to keep quiet about this vulnerability because many other providers contained a similar flaw and I worked with them to eliminate their problems.

Overview

When developing a OpenID system is very important to include form tokens in order to prevent CSRF attacks. The MyOpenID.com site had included form tokens but the token was stored in the URL of the site.

Proof of concept

This POC no longer works as MyOpenID has fixed it, I am releasing it here to show other providers the problem of CSRF. It works by opening a new window to the OpenID enabled web site and performs a login check; the window then connects to the provider (MyOpenID) and displays the Allow URL, Deny URL etc. If the user has already logged onto their provider and saved their password, the script then gathers the form token from the URL (Safari only) using a vulnerability I found and submits a form with the correct form token and successfully adds the site to the trusted list without user interaction.

OpenID POC

Recommendation

I strongly recommend that all providers confirm the password before adding a site to their trusted list and also include form tokens within the request form.

2 Responses to “OpenID security issues”

  1. eugene writes:

    Gareth, that’s interesting! Check out the following paper that discusses a few other OpenID security issues

  2. Gareth Heyes writes:

    Thanks eugene I shall check out the paper, I think OpenID will be open to loads of problems if the providers don’t take time to secure their systems.