Skip to main content
ad info

 
CNN.com technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


Schwab's site could be vulnerable

Industry Standard

(IDG) -- Charles Schwab's online customers are at risk of having their account information accessed and their accounts manipulated due to the same software vulnerability that affected E-Trade's Web site in September.

Both online brokers are highly susceptible to so-called cross-site scripting, a common flaw found in Web-based applications that allows a browser to be tricked into performing an execution that the user did not intend.

  MESSAGE BOARD
 

In the Schwab case, an attacker could use JavaScript to gain control of another Schwab customer account while the user is online, and could retrieve the cookie that Schwab employs for user authentication, according to Jeffrey W. Baker, who posted the vulnerability on the Bugtraq security mailing list Monday. The security flaw also opens the possibility of an attacker figuring out a customer's login cookie.

"The attacker can choose to either gain interactive use of the service, or to cause the account holder to perform inadvertent unwanted actions on the attacker's behalf," Baker writes.

IDG.net INFOCENTER

IDG.net - IDG.net Multimedia & Leisure page
 - Free daily newsletter for tech-savvy professionals
 - Get instant answers from the Dummies Network
 - Computerworld Communities

Related IDG.net Stories
 Asian governments commit to universal Internet access
 Chicago moves to build metropolitan-area network
 It takes an e-village
Features
 - Scholars: e-mail reveals 'language of love'
 - Tech skills help blend work, home lives
 - Getting a degree from inside a cubicle
Visit an IDG site


IDG.net search



Schwab customers can become vulnerable to the exploit merely by clicking on a Web page link, or on an image embedded in an e-mail or a message on a stock trading bulletin board.

Baker was critical of the way Schwab has handled -- or rather not handled, in his opinion -- the problem. He said he discovered the security flaws in August and that despite having discussions with Schwab staff about them from Aug. 25 to Aug. 28, the problem has not been resolved.

"As an organization, Schwab should strive to fix problems when given five-month advance notice," he writes. "They should raise their ethical standards to alert their paying customers whenever a system vulnerability is reported."

Elias Levy, CTO of the SecurityFocus.com portal and moderator of the Bugtraq mailing list, says the vulnerability is the result of poor programming practices.

Schwab spokesman John Sommerfield said the brokerage has taken "intermediate" steps to correct the problem, though he declined to specify what those steps are. The company will have a complete fix for the problem by the end of the year, he says, adding that no incidents have been reported and that the risk is "relatively minimal" for customers.

"In order for someone to attack you as a Schwab customer, the hacker must know you're a customer and [that you are] logged on," Sommerfield says. "Also, the hacker must know the customer's e-mail address."

Baker recommends that Schwab customers disable JavaScript in their browsers and that they not visit any other Web sites, read e-mail or use bulletin boards while using Schwab's Web site. He also warns that Schwab customers should log off the Schwab site when they are finished using it, and always close and restart their browser before and after using the Web site.

In September, Baker reported on Bugtraq the same scripting problem at E-Trade, in hopes of spurring the brokerage to take action. A call to an E-Trade spokeswoman to find out if the cross-site scripting vulnerability has been fixed was not immediately returned Wednesday evening.

The cross-site scripting problem first came to light in February when experts at CERT, the Computer Emergency Response Team at Carnegie Mellon University, released an advisory. In general, Web users are advised not to open e-mail messages or click on Web links that aren't from trusted sources.




RELATED STORIES:
Security holes found in Windows Media Player
November 27, 2000
MindSpring site exposes some password files
October 25, 2000
CERT steps up disclosure of security holes
October 12, 2000
Instant Messenger error leaves old buddy lists to new users
August 28, 2000
Security flaw discovered in Network Associates PGP software
August 28, 2000

RELATED IDG.net STORIES:
E-trade says it has fixed password security hole
The Industry Standard)
Security hole exposes Hotmail accounts
(The Industry Standard)
Debate erupts over security holes
(Computerworld)
Industry heavyweights join to address key e-biz problems
(Network World Fusion)
A guide to investing online
(PCWorld.com)
Schwab launches wireless online trading
(InfoWorld)
Trade secrets
(CIO)
Online brokerage wars heat up
(Computerworld)

RELATED SITES:
Charles Schwab Corp.
SecurityFocus.com

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top  © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.