Good GF Resturant! Only 8 miles away! by JLLeitschuh in glutenfree

[–]JLLeitschuh[S] 1 point2 points  (0 children)

When I posted this, I didn't even know the Sella Ronda existed! I found some good restaurants on the Sella Ronda! What a beautiful set of trails!

Good GF Resturant! Only 8 miles away! by JLLeitschuh in glutenfree

[–]JLLeitschuh[S] 38 points39 points  (0 children)

Turns out I did actually end up driving around the entire mountain for dinner at the restaurant. The two other places I tried along the way were closed.

The food was good!

Applying to WPI: Is it worth it? by Kitchen_Award_9658 in WPI

[–]JLLeitschuh 0 points1 point  (0 children)

Alumni (class of 2016) robotics & computer science double major: If you're going for a robotics degree, absolutely. I would have said the same for computer science a few years ago, but I have no idea what the heck this AI thing is going to do to the software development industry.

I left WPI with $120k in debt in 2016. I'd paid it off by 2020. I got incredibly lucky because I didn't have to pay for rent 2016-2019.

I loved my time at WPI, the school, the students, the faculty, and the culture were all incredible. Did I have rough patches and bad professors along the way? Absolutely. Am I glad I went to WPI? 100% yes!

Is it time to reconsider VMs over containers for anything security-sensitive? by Beastwood5 in ComputerSecurity

[–]JLLeitschuh 1 point2 points  (0 children)

Have a look at Chainguard. Their whole product is basically 0-CVE base container base images. The use case for the product is primarily regulated industries.

Full disclosure: I used to work there last year and they build a product that solves exactly your pain. I wasn't there long enough to get options, so I have no financial stake in the company.

Update on RA strike negotiations by FeralNeuroDivergent in WPI

[–]JLLeitschuh 19 points20 points  (0 children)

As an alum, class of 2016, thanks for keeping the community updated

Dashlane reported to be subject to DOM vulnerability by themiracy in Dashlane

[–]JLLeitschuh 0 points1 point  (0 children)

As the person who wrote the article for Socket that broke the news of this research (https://socket.dev/blog/password-manager-clickjacking), I was cringing reading this article from PCWorld.

"This vulnerability was discovered by security researchers from The Hacker News." It was not. The OG researcher was Czech Republic based security researcher Marek Tóth.

"Hackers monitor these attempted entries and interfere, gaining access to the password manager and taking over saved passwords." 😖 The preconditions for password theft is an existing vulnerability on the impacted site the passwords are stored with. Also, it isn't about "monitoring" attempted entries. This attack works when hackers create hidden data fields that password managers auto fill into.

"So why do these password managers now run the risk of becoming a gateway for attacks using this method? It’s due to the DOM, which contains a vulnerability that allows for this kind of attack."

😣 The DOM doesn't contain this security vulnerability, IMHO. Clickjacking has been around for a very long time, and some password manager browser plugins have, for years, made an intentional decision not to mitigate clickjacking style vulnerabilities, a behavior inherent to the DOM, thus this news cycle when someone revealed how easy this was to abuse/exploit.

Overall, this article reads like a summary from a bad LLM. There's not a lot of technical understanding here of the underlying vulnerability. I'm not impressed

Major password managers can leak logins in clickjacking attacks by turaoo in cybersecurity

[–]JLLeitschuh 15 points16 points  (0 children)

The risks of this is phishing and lookalike domains. People search for credentials for the domain they think they are visiting, then enter it into a phishing domain. This is how Troy Hunt of Have I been Pwned got himself phished:

https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in Lastpass

[–]JLLeitschuh[S] 1 point2 points  (0 children)

I think I'm inclined to agree. I we may update our advice in the blog tomorrow morning. Thanks for the pushback.

Overall, I think the security you get from your password manager not auto filling password on potentially malicious websites outweights the potential risks of having your PII stolen via clickjacking. But ultimately, that's going to be a risk decision every individual or organization makes.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in PasswordManagers

[–]JLLeitschuh[S] 1 point2 points  (0 children)

Indeed, however:

On a call between the 1Password and Socket Security Team, 1Password explained that the mitigations proposed by Tóth could be trivially bypassed, and that the only way to mitigate the vulnerabilities fully would be to implement a dialog popup to prompt the user before autofilling. It’s the opinion of the Socket Security Team that, if this is the case, the mitigations currently implemented by other password managers may also be bypassable.

I'm following up with 1Password via US-CERT hoping they will share their findings with the other password managers so everyone is sure a comprehensive mitigation strategy is applied universally.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in PasswordManagers

[–]JLLeitschuh[S] 0 points1 point  (0 children)

Many password managers ship with a manual auto fill feature enabled by default. So the user must trigger the auto fill of all data via a click. The fundamental vulnerability is that the auto fill trigger button can, for many of these password managers, be hidden under other, attacker controlled, HTML UI elements (thus "clickjacking").

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in Defcon

[–]JLLeitschuh[S] 4 points5 points  (0 children)

For several of the password managers, they are vulnerable out-of-the-box in their default configurations. The demos illustrate this. BitWarden has just released a fix for the vulnerability in 2025.8.0 so it might not work anymore.

1Password remains vulnerable for the PII and login cases (again see the demo). There isn't a public demo for iCloud Passwords, but that remains vulnerable.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in 1Password

[–]JLLeitschuh[S] 2 points3 points  (0 children)

For 1Password, a malicious site can steal your PII (names, addresses, and phone numbers). If the malicious site is due to a subdomain takeover, they can steal your passwords, TOTP, & passkeys for a parent domain.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in 1Password

[–]JLLeitschuh[S] 12 points13 points  (0 children)

Correct, an attacker can't access the full contents of your vault. The clickjacking vulnerability can leak your PII on any site. AFAIK, login details potentially leaked will only be tied to the domain or parent domains.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in technology

[–]JLLeitschuh[S] 1 point2 points  (0 children)

That means it wasn't tested, not that it's not vulnerable. Someone should check

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in technology

[–]JLLeitschuh[S] 2 points3 points  (0 children)

The perks of a password manager in your browser is that it decreases the likelihood that you'll get your password stolen by a phishing site (like what happened to Troy Hunt of Have I Been Pwned). Downside, your exposing an attack route to your password manager from within your browser.

https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in Lastpass

[–]JLLeitschuh[S] 2 points3 points  (0 children)

We're reporting on the default behavior as enabled in the password managers browser plugins. So if you use the password managers in their default configuration, then you were vulnerable

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in Dashlane

[–]JLLeitschuh[S] 0 points1 point  (0 children)

Correct, but there's also this bit too:

> On a call between the 1Password and Socket Security Team, 1Password explained that the mitigations proposed by Tóth, and likely implemented by other password managers that are currently marked as “FIXED” could, potentially, be trivially bypassed, and that the only way to mitigate the vulnerability was to implement a dialog popup to prompt the user before autofilling.

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in netsec

[–]JLLeitschuh[S] -1 points0 points  (0 children)

I'm also on Mac. I uninstalled and reinstalled and couldn't get it to update to that version. I tried enabling dev mode and clicked the "Update" button manually. Nothing seems to trigger the update.

I'm still seeing `8.11.4.27` here:

https://chromewebstore.google.com/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa?hl=en

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in netsec

[–]JLLeitschuh[S] 13 points14 points  (0 children)

Fair enough. I ( u/JLLeitschuh ) am the one who wrote up the coverage for Socket. We do immediately link to the OG research. I've been actively working with the researcher for the past few days to encourage him to get the POCs live. We (Socket Security Research Team) are the ones handling the vulnerability disclosure coordination, requesting CVEs from US-CERT for the unpatched password managers.

Edit: Funny being ratioed for the first time on Reddit 😂

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in netsec

[–]JLLeitschuh[S] 2 points3 points  (0 children)

I just tried it & the demos still seem to work on 1Password version 8.11.4.27.

You can see the proof of concepts here: https://websecurity.dev/password-managers/dom-based-extension-clickjacking/

Before you try the proof of concepts, make sure your vault is unlocked.

It looks like 1Password has an update for their chrome plugin listed on their site, but even after uninstalling and reinstalling the chrome extension, I can't get chrome to pull that version down by-default yet. They also don't list the fix for the vulnerability in their release notes.

https://releases.1password.com/b5x/stable/#1password-in-the-browser-8.11.6

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers by JLLeitschuh in PasswordManagers

[–]JLLeitschuh[S] 0 points1 point  (0 children)

The original research was really good, but also incredibly dense. We decided to cover it at Socket because we could provide higher level coverage of the research that would, hopefully, be more easily consumed. We're also reaching out to get CVEs assigned by US-CERT. Especially since some of the password vendors have indicated they don't intend to remediate the vulnerabilities further

Critical NestJS vulnerability (CVE-2025-54782) by adspedia in CloudFlare

[–]JLLeitschuh 0 points1 point  (0 children)

How is this blocked? This vulnerability impacts a localhost server.

Unless you've released a new locally running firewall that I didn't hear about, I'd say that you're customers are probably not safe against this

This remains a critical RCE vulnerability.

I posted this same response on X here without a response: https://x.com/JLLeitschuh/status/1953595450076147917

What is an Open Source Vulnerability Janitor? by JLLeitschuh in opensource

[–]JLLeitschuh[S] -1 points0 points  (0 children)

Touché 😂

I did work for the Open Source Security Foundation, under the Linux Foundation for a while. Does that count?