Multilogin antidetect browser. DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off

Multilogin antidetect browser. DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off

What is browser automation

TOR browser automation.

There is a live cross-site scripting (XSS) vulnerability in takedowns website DMCA-dot-com’s user interface. It’s existed for more than a year and the site’s operators don’t appear to be interested in fixing it.

Infosec researcher Joel Ossi, founder of Dutch security firm Websec, announced his findings after spending more than a year trying and failing to get DMCA-dot-com to take the XSS seriously.

“I registered at DMCA at first with an intention to protect my own website,” he blogged, explaining that he found unescaped free-text entry boxes in the DMCA user interface allowed him to create an XSS.

DMCA-dot-com is a copyright takedown service. Users pay the site to handle the tedious part of getting an alleged copyright infringer to delete content from the World Wide Web, using the infamous US Digital Millennium Copyright Act. Prices can be as high as $199 for a takedown.

Ossi showed The Register his live findings on a video call. Every single time he clicked to a new webpage in the DMCA-dot-com user area, the classic XSS tell-tale – a popup with a custom message – appeared. The script to do so was really quite simple:

The code needed to invoke a simple XSS on DMCA-dot-com

He went public with his findings after a year spent trying and failing to get the interest of DMCA-dot-com’s operators when he first found the vuln in late 2020.

“Our development team will be reaching out if / when they need to. Our support department cannot help you on this,” said the last message sent to Ossi by DMCA-dot-com as he tried to get uninterested helpdesk folk to pass along his vuln report.

  Multilogin antidetect browser. IKEA: Cameras were hidden in the ceiling above warehouse toilets for 'health and safety'

While he asked for a bug bounty, El Reg confirmed that Ossi had made full private disclosure of his findings before raising the question of payment.

Browser automation extension

Both Ossi and The Register made multiple attempts to contact DMCA-dot-com. In our case the company didn’t even acknowledge our efforts to get in touch.

Support tickets raised by Ossi with DMCA-dot-com’s helpdesk in September 2020

While he may have been the first, Ossi isn’t the only researcher to find the XSS vulns in DMCA-dot-com. Two separate entries on the Open Bug Bounty site show XSS vulns in DMCA, one dating from April last year and the other from June.

  • Why, yes, you can register an XSS attack as a UK company name. How do we know that? Someone actually did it
  • I helped Amazon.com find an XSS hole and all I got was this lousy t-shirt
  • Sealed with an XSS: IT pros urge Lloyds Group to avoid web cross talk
  • GoDaddy plugs account hijack XSS vulnerability

As Reg readers know, cross-site scripting vulnerabilities let a malicious person execute scripts on somebody else’s website. As explained by MITRE, the flaw typically exists because free text entry forms don’t sanitise user inputs.

“The most common attack performed with cross-site scripting involves the disclosure of information stored in user cookies,” says MITRE. “Typically, a malicious user will craft a client-side script, which – when parsed by a web browser – perform, some activity (such as sending all site cookies to a given E-mail address).”

Harvesting active login tokens from cookies could give an attacker access to your account on DMCA-dot-com. Ossi told us it wouldn’t take much to falsely run up billable services, remove DMCA-dot-com’s protection features from a given webpage or close an account.

  Multilogin antidetect browser. That critical vulnerability might not be the first you should patch

Jake Moore, global cybersecurity advisor to infosec firm ESET, told The Register: “Cross-site scripting vulnerabilities can allow an attacker to masquerade as a standard user and carry out any actions that the user is able to perform such as access the user’s data. User accounts can then ultimately be compromised and credentials or other information could be stolen with great ease.”

Immersive Labs’ app security specialist Sean Wright added: “Despite the fact they have been a part of the attacker toolkit for some time, many still underestimate the risks from XSS vulnerabilities. However, they are effectively client side remote code execution vulnerabilities. In the right circumstances, and combined with tools such as the Browser Exploitation Framework, XSS vulnerabilities give an attacker almost complete control of a browser. Ultimately, this could lead to redirects to malicious sites and even performing actions on behalf of the user.”

It is to be hoped that someone responsible at DMCA-dot-com pays attention to this year-and-a-half-old vuln disclosure. If it’s been around this long, somebody might be using it to do something bad. ®

How to use browser automation studio.

Leave a Reply

Back to top