While digging into some old phishing campaigns, I came across something interesting. It’s nothing earth-shattering, but the sheer length of time this vulnerability has remained viable, even after being identified in the press as actively exploited in the wild, is noteworthy.
You see, nearly eight years after being abused in a phishing campaign, the vulnerability is still present.
It starts with a News.com piece from November 2005 The article discusses a phishing campaign, which purports to be an email from the IRS, but instead takes the victim to a fraudulent site which asks for their Social Security Number, Credit Card Details, and IRS Filing information.
With GovBenefits.gov there is a great opportunity for criminals by posing as the IRS to get a great deal of information, including your credit card details and Social Security number
There’s more details available in Sophos’ original report.
News.com apparently contacted the Department of Labor about the issue back in 2005, and cites an unnamed representative as stating “The government is aware of the issue and is working to fix it.”
Surely the government once made aware of an active campaign abusing one of their sites, and promising to fix it, can manage that fix in eight years. Right? Well, let’s see…
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Some time has passed since all this was written, and it seems govbenefits.gov is no more. All visits to the site now redirect with a 301 Moved Permanently response to benefits.gov. So to the vulnerable URL cited by News.com redirects to the newer beneftis.gov branding.
Interestingly, the Location header it gives is malformed. Their redirect seems to strip the first / that trails the hostname, so it probably breaks a good number of legitimate links, bookmarks, etc. as well. This effectively means that the redirect will only work for bare requests to govbenefits.gov without any path or file name following.
If we correct it, by adding the missing slash, we see a much more interesting result.
1 2 3 4 5 6 7 8 9 10
Open-Redirects aren’t the most severe of vulnerabilities, and abuse doesn’t really damage the vulnerable organization, so it’s not uncommon for them to linger. They are, however, of much more significance when the vulnerable site carries additional trustworthiness in the minds of target victims. The IRS Phishing campaign noted by Sophos in 2005 shows a good example of the impact. It’s a shame that even after being notified of the vulnerability, it appears those responsible for securing government web properties, and the trust the general public places in them, are unwilling or unable to respond.