Hi,
AlwaysOnSSL was a free certificate authority operated by CertCenter.
I recently noticed that their main webpage was gone, but pieces of the
service were still online.
I immediately found a few web security issues. I reported those to
certcenter and digicert (which is the root CA their intermediate chains
to).
This is what I reported:
Partly disfuctional
===================
The service seems to be partly disfunctional. The start page is just
showing an empty document.
However when directly calling subpages, e.g.
https://alwaysonssl.com/issue.php
there still seems to be an operational service.
This looks to me like AlwaysOnSSL is not actively maintained.
XSS
===
The certificate issuance form has a trivial injection issue. Simply
putting something like ">test<h1> will inject HTML. CSP+XSS Auditor
prevent this from being a simple XSS, but I'm pretty sure this can be
bypassed with enough effort.
CSRF
====
The forms don't seem to contain any CSRF tokens. I haven't analyzed
this in detail, but I believe this likely means an attacker can
interfere with the issuance process and may be able to inject his own
CSR and forge a certificate.
Account management
==================
I have an existing account for
alwaysonssl.com from previous tests.
There seems to be no way of either deleting the account or changing the
password. I consider not offering a password changing option a security
problem as well.
I believe all of these issues show that
alwaysonssl.com is an
unmaintained, partly broken service with a total lack of secure coding
practice, yet it's able to issue valid certificates that chain down to
a digicert root.
-----------------
In response to this the service was completely disabled.
In one of the response mails CertCenter wrote me:
"Among other things, we operate a web application firewall that
prevent requests when it detects dangerous data. An XSS request like
the one you carried out apparently did not consider the WAF to be
relevant."
This IMHO shows a serious lack of knowledge about web security basics
and an undeserved trust in WAFs. (The WAF filter was easily bypassable,
they also had a CSP which I believe was bypassable, too, but they
switched the service off before I could show that.)
Given the service is switched off now I think there's nothing
particularly to do, but maybe it's a reminder to have a closer look at
the security of CA issuance web systems.
--
Hanno Böck
https://hboeck.de/
mail/jabber:
ha...@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42