Security issue: ThinkVantage Password Manager
Security issue: ThinkVantage Password Manager
A vulnerability with password managers in general has been discussed in various forums.
See http://www.info-svc.com/news/11-21-2006/ for a description of the exploit.
More specific discussion focused on the password manager in FireFox see http://www.dslreports.com/forum/remark,17319516
So I got curious, because the ThinkVantage password manager seems to use a similar technique to FireFox to detect when to inject login and password. A quick test, using the test page in the first link, showed that the ThinkVantage password manager appears to be vulnerable as well.
See http://www.info-svc.com/news/11-21-2006/ for a description of the exploit.
More specific discussion focused on the password manager in FireFox see http://www.dslreports.com/forum/remark,17319516
So I got curious, because the ThinkVantage password manager seems to use a similar technique to FireFox to detect when to inject login and password. A quick test, using the test page in the first link, showed that the ThinkVantage password manager appears to be vulnerable as well.
How I tested: Password manager is configured "normally" -- it is version 2.0.0 and "watches" web pages for login prompts, then later fills in the fields and triggers the login automatically.
I went to http://www.info-svc.com/news/11-21-2006/ and clicked the proof of concept link in the middle of the page. This took me to another web page with a login prompt, where Password Manager dutifully popped up a prompt asking me whether I wanted to remember this password and login info. I typed in "foo" for login and "bar" for password. Sure enough, this got captured by password manager and then it looks like it got recaptured from password manager by the proof of concept exploit. See the link above for an explanation of how the exploit works.
A workaround with Password Manager seems to be to turn off the automatic login option (allow PM to fill in the data, but not log in automatically) unless you can trust the site will never contain anything injected by a third party (such as a blog post). By not allowing automatic activation of the login, you can detect that this is happening and simply navigate manually from any suspicious looking situation.
I just hope someone can prove me wrong on the vulnerability.
I went to http://www.info-svc.com/news/11-21-2006/ and clicked the proof of concept link in the middle of the page. This took me to another web page with a login prompt, where Password Manager dutifully popped up a prompt asking me whether I wanted to remember this password and login info. I typed in "foo" for login and "bar" for password. Sure enough, this got captured by password manager and then it looks like it got recaptured from password manager by the proof of concept exploit. See the link above for an explanation of how the exploit works.
A workaround with Password Manager seems to be to turn off the automatic login option (allow PM to fill in the data, but not log in automatically) unless you can trust the site will never contain anything injected by a third party (such as a blog post). By not allowing automatic activation of the login, you can detect that this is happening and simply navigate manually from any suspicious looking situation.
I just hope someone can prove me wrong on the vulnerability.
Results in testing the alleged exploit on my machine are inconclusive with respect to IE6. I do not use Firefox; however, this type of exploit should be investigated by all browser software vendors.
I saved my "test" login/password combo using the ThinkVantage Password Manager, which is linked to my fingerprint reader that is configured for "secure" (not "convenient") mode.
When I was redirected to the Google site after logging in, the address bar at the Google site did NOT reveal my selected test login/password combo.
Here is what appeared in my IE6 address bar:
For now, further testing appears necessary to confirm this as a true exploit across various browser platforms.
I saved my "test" login/password combo using the ThinkVantage Password Manager, which is linked to my fingerprint reader that is configured for "secure" (not "convenient") mode.
When I was redirected to the Google site after logging in, the address bar at the Google site did NOT reveal my selected test login/password combo.
Here is what appeared in my IE6 address bar:
Code: Select all
http://www.google.com/search?q=Chapin+Information+Services&loginuser=&loginpass=&x=15&y=9Regards,
Steve
Steve
Steve, with the PM configured for "convenient" mode by default, the login and password values did appear in the link. So it looks like using "secure" mode helps prevent the problem.
BTW, you can mix the modes. My critical sites are all configured for "secure" mode (which can be a pain, since you have to right-click each entry in the PM entries list then choose Properties to change the mode). But auto activate is definitely off for all.
BTW, you can mix the modes. My critical sites are all configured for "secure" mode (which can be a pain, since you have to right-click each entry in the PM entries list then choose Properties to change the mode). But auto activate is definitely off for all.
Interesting...Lenovo certainly needs to be advised about this. No telling how many users are running PWM (ThinkVantage Password Manager) in default mode that would expose them to this exploit. Sigh...well, at least the "secure" mode appears safe. For now.claudeo wrote:Steve, with the PM configured for "convenient" mode by default, the login and password values did appear in the link. So it looks like using "secure" mode helps prevent the problem.
Thanks, Claudeo, for bringing this issue to the community's attention.
Regards,
Steve
Steve
-
- Similar Topics
- Replies
- Views
- Last post
-
-
IBM- Lenovo T61- how to run the ThinkVantage button
by Radovan-kocour » Sun Mar 12, 2017 3:19 pm » in ThinkPad T6x Series - 1 Replies
- 923 Views
-
Last post by RealBlackStuff
Mon Mar 13, 2017 4:27 am
-
-
-
PC Doctor ThinkVantage Toolbox -- WinXp 32-bit
by SimonA » Fri Mar 24, 2017 4:37 am » in Windows OS (Versions prior to Windows 7) - 2 Replies
- 1064 Views
-
Last post by Haxoc112
Mon May 29, 2017 9:00 pm
-
-
- 4 Replies
- 2059 Views
-
Last post by dandreye
Sun Jan 08, 2017 1:29 pm
-
-
Identify Wifi Card Win 7 64 bit X230 & missing bits device manager
by blink » Tue Feb 28, 2017 8:56 pm » in ThinkPad X230 and later Series - 3 Replies
- 481 Views
-
Last post by w0qj
Tue Mar 07, 2017 3:55 am
-
Who is online
Users browsing this forum: No registered users and 9 guests





