Fear not: Kindle flaw that opened your Amazon account to attackers appears fixed

A concerning XSS flaw discovered by a German security researcher appears to be fixed. Here's what happened.

Getting access to your Amazon account credentials is one of several holy grails for hackers. With access to your Amazon account, hackers can set-up new credit cards in your account or max out the current ones on file with some big Amazon purchases. Plus, personal details contained in your Amazon account can lead to the plundering of other online accounts.

It was concerning then, when security researcher Benjamin Daniel Mussler recently said that Amazon's website was vulnerable to a staggeringly simple cross-site scripting attack.

The good news, however, is that Amazon appears to have fixed the flaw at this writing. Mussler told PCWorld via email that Amazon appears to have fixed the vulnerability after the security researcher blogged about it on Monday.

We've asked Amazon for confirmation of the fix and will update this post should the company respond.

The vulnerability

Imagine this scenario: You find an interesting free e-book online with a file name of "SuperCoolBook.mobi." Since you want to read it, you download the book and then email it to your Kindle library using the handy Send to Kindle feature.

Later that day, you're checking out your Kindle Library on Amazon's website when you notice a strange e-book. On closer inspection, you see that the title of the book, as displayed by Amazon, appears to be computer code such as

<script src="https://www.example.org/script.js"></script>

Whoops! The metadata in SuperCoolBook linked to a malicious JavaScript file instead of displaying a proper title. And by visiting Amazon's site you've just enabled that malicious script to run, steal your session cookies, and get access to your Amazon account. Let the plundering and lulz begin.

At least that's what could've happened if the vulnerability still existed, according to Mussler.

Nate Hoffelder, who runs the e-book centric blog The Digital Reader, reported that he was able to replicate the weakness as recently as Monday.

Even if this vulnerability was not fixed, however, it would only work under a very specific set of circumstances. First, you'd have to be a heavy user of the Send to Kindle feature, and you'd need to be downloading e-books and other documents from sketchy places (read: pirate sites).

Then you'd have to visit the "Manage Your Content and Devices" page before the script could run. Opening the document in an Amazon app wouldn't be enough. I don't know about you, but prior to running my tests today I couldn't remember the last time I'd checked my Kindle library content on Amazon.com as opposed to inside an app.

Nevertheless, it's concerning that a malicious attack could happen just by getting tricky with the metadata. Good thing it appears to be fixed.

This is the second time Muller discovered a scripting vulnerability on Amazon.com. In late 2013, Muller discovered the exact same flaw in Amazon's site, which the company fixed three weeks after it was first notified . In July, Muller noticed the vulnerability had resurfaced. He decided to publicize the issue after Amazon did not respond to his second discovery for more than two months.

Tags amazonXSSconsumer electronicskindlee-readerse-books

Show Comments