Announcement

Collapse
No announcement yet.

PCI vulnerabilities

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    PCI vulnerabilities

    I use hacker safe (mcafee) and have been getting the following error:

    Device Reason
    www.stop-crime.com Potential Sensitive Persistent Cookie Sent Over a Non-Encrypted (SSL) Channel
    SSL Protocol Version 2 Detection


    I was told this by my host:

    The persistent cookie issue is a known item, and unfortunately not something we can fix at this point. It's something that Miva is working on and will provide a fix by means of an updated MivaVM v5.07. Until that new version is made available, there's no way to fix this particular item. Best advice I have is to just wait until Miva released VM 5.07 and then re-submit your site to be scanned again.

    Has this fix ever came out? Are we supposed to just run a non PCI compliant site or what?
    Rick

    Self Defense Products to stop crime.

    Email: onlinesecurityproducts*stop-crime.com

    #2
    Re: PCI vulnerabilities

    This issue only affects McAfee customers currently; they've chosen to interpret Visa's PCI guidelines in a way that no other vendor currently does, which affects Miva Merchant and several other shopping carts. It could be argued that they have singled out Merchant for some reason since 90% of shopping carts on the market function the same way and they are only flagging a few for this for whatever reason; they won't provide more detailed information.

    5.07 will fix the issue but fundamentally changing the way Merchant handles its cookies and basket/session tracking is not a quick fix nor one that you would want released quickly since it could affect your customers' ability to check out which means lost revenue; Miva is working on it though and has already provided some hosts with test-only versions of 5.07.
    David Hubbard
    CIO
    Miva
    [email protected]
    http://www.miva.com

    Comment


      #3
      Re: PCI vulnerabilities

      Originally posted by ILoveHostasaurus View Post
      This issue only affects McAfee customers currently; they've chosen to interpret Visa's PCI guidelines in a way that no other vendor currently does, which affects Miva Merchant and several other shopping carts. It could be argued that they have singled out Merchant for some reason since 90% of shopping carts on the market function the same way and they are only flagging a few for this for whatever reason; they won't provide more detailed information.

      5.07 will fix the issue but fundamentally changing the way Merchant handles its cookies and basket/session tracking is not a quick fix nor one that you would want released quickly since it could affect your customers' ability to check out which means lost revenue; Miva is working on it though and has already provided some hosts with test-only versions of 5.07.
      David, Thanks for the quick response. You are right, I would not want a quick fix.
      Rick

      Self Defense Products to stop crime.

      Email: onlinesecurityproducts*stop-crime.com

      Comment


        #4
        Re: PCI vulnerabilities

        It's also worth noting that if this issue was a real security issue and not of McAfee's making we'd be moving mountains.

        Since you're still PCI Compliant and there is no real security issue, we're moving diligently but not rushing.
        Thanks,

        Rick Wilson
        CEO
        Miva, Inc.
        [email protected]
        https://www.miva.com

        Comment


          #5
          Re: PCI vulnerabilities

          Rick (seahawkfan that is),

          We have the beta release of MivaVM v5.07 - if you'd like us to install it on your domain - simply open a support ticket with us and we will put it in place.

          Comment


            #6
            Re: PCI vulnerabilities

            Can Miva or David provide a little more information about how Miva is going to be fixing this "issue"? I have systems that share cookies with Miva, so I want to make sure they will remain compatible and that both will be considered "secure".

            Comment


              #7
              Re: PCI vulnerabilities

              Sure, we're allowing a setting in the Miva Empresa 5.07 engine to force cookies into secure mode. So if you choose to make Cookie Secure=Yes then all of your cookies will get set using SSL.

              One caveat to this, it will NOT work with Shared Certs. This is a byproduct of McAfee's interpretation of PCI, which under their logic it's not possible to be PCI Compliant and use a shared cert.

              5.07 doesn't force cookies secure, it allows for that to be a setting.
              Thanks,

              Rick Wilson
              CEO
              Miva, Inc.
              [email protected]
              https://www.miva.com

              Comment


                #8
                Re: PCI vulnerabilities

                Does that basically make every page use https? How do large scale sites like amazon and newegg handle cookies so that they don't flagged?

                Comment


                  #9
                  Re: PCI vulnerabilities

                  I think this whole shared SSL issue will probably go away pretty soon, with how the PCI Compliance scanning is done and how Visa/MasterCard/Discover/Amex want security to be implemented. Not only that, but hosting e-commerce sites in shared hosting environment by itself may very possibly change soon, too. We were at the hosting conference in Chicago just last month and there was a session on PCI Compliance, and the general consensus is that for a site to be truly PCI compliant under the new compliance rules, the site cannot be hosted on a shared server. This is supposedly something that Visa/MasterCard want to start implementing as soon as October 11th, but I don't think it's going to work and be an overnight requirement - there are way too many e-commerce sites on shared servers that would be impacted by such short notice (or lack of notice, really, as other than talking direct to PCI companies or Visa/MasterCard, I don't think anyone was sent any notices about this yet).

                  There was a number of hosting companies that already force their clients to upgrade to dedicated servers if they want to be 1) PCI compliant and 2) have daily security scans. I can see #2 being an issue - having a number of sites scanned on a shared server every day, on top of all the webbots spidering these same sites often simultaneously, is creating sometimes very high loads on these servers. Especially on larger sites that have thousands of products and take several hours to get scanned and spidered every day. I'm not convinced, though, that sites "must" be on dedicated serves to be PCI compliant... although I can see how one site having a script that can allow privileged access to the server could affect other clients' security and PCI status, so perhaps that's the direction credit card companies and PCI scanning companies are taking... Either way, this whole PCI compliance thing is reshaping the hosting environment for e-commerce sites, and we will very likely see a lot of changes over the next couple of years. What we see now is just the tip of the iceberg.

                  Comment


                    #10
                    Re: PCI vulnerabilities

                    Originally posted by Brandon MUS View Post
                    Does that basically make every page use https? How do large scale sites like amazon and newegg handle cookies so that they don't flagged?
                    I don't think they use Macafee Secure (previously known as ScanAlert HackerSafe). Other PCI compliance companies are not yet flagging the persistent cookie issue as a vulnerability worthy of removing the certification from your site - although we have seen ControlScan already send notices about it - though at this point this doesn't remove the PCI certification status from your domain - it's more of an informational item *at this point*.

                    Comment


                      #11
                      Re: PCI vulnerabilities

                      Does that basically make every page use https? How do large scale sites like amazon and newegg handle cookies so that they don't flagged?
                      No, 5.07 will not force every page secure, but it will use SSL to set the cookie on the shoppers computer.
                      Thanks,

                      Rick Wilson
                      CEO
                      Miva, Inc.
                      [email protected]
                      https://www.miva.com

                      Comment


                        #12
                        Re: PCI vulnerabilities

                        Originally posted by seahawkfan View Post
                        I use hacker safe (mcafee) and have been getting the following error:

                        Potential Sensitive Persistent Cookie Sent Over a Non-Encrypted (SSL) Channel
                        SSL Protocol Version 2 Detection
                        Does mcafee consider every cookie "potential sensitive". When I look at the cookies in my browser set by bankamerica.com there are several. Only one of them is listed as "send for: encrypted connections only". The others are for any type of connection. Is bank of america's connection vulnerable? Would they pass mcaffee's testing?
                        Bill Weiland - Emporium Plus http://www.emporiumplus.com/store.mvc
                        Online Documentation http://www.emporiumplus.com/tk3/v3/doc.htm
                        Question http://www.emporiumplus.com/mivamodu...vc?Screen=SPTS
                        Facebook http://www.facebook.com/EmporiumPlus
                        Twitter http://twitter.com/emporiumplus

                        Comment


                          #13
                          Re: PCI vulnerabilities

                          McAfee's perspective is that ALL COOKIES are sensitive, even if there totally blank.
                          Thanks,

                          Rick Wilson
                          CEO
                          Miva, Inc.
                          [email protected]
                          https://www.miva.com

                          Comment


                            #14
                            Re: PCI vulnerabilities

                            Originally posted by wcw View Post
                            Does mcafee consider every cookie "potential sensitive". When I look at the cookies in my browser set by bankamerica.com there are several. Only one of them is listed as "send for: encrypted connections only". The others are for any type of connection. Is bank of america's connection vulnerable? Would they pass mcaffee's testing?
                            If the cookie holds anything that uniquely identifies you, then it would cause mcafee to fail them. So, if the cookie in question is just to make sure that when you visit their site, your choice to keep some box displayed on the page is remembered, that would not be an issue, however if the cookie is so they can pre-load the account access id, then that is a problem according to mcafee. I don't think they know the difference though from an automated testing perspective, so I believe they would fail mcafee regardless and have to prove to them otherwise that the cookie isn't revealing user-specific data.
                            David Hubbard
                            CIO
                            Miva
                            [email protected]
                            http://www.miva.com

                            Comment


                              #15
                              Re: PCI vulnerabilities

                              I guess a first and last name would be user specific data. Is 5.07 going to effect all cookies or just the htscallerid?

                              Rick or Mark -

                              The concern I have is if you have
                              <META HTTP-EQUIV="Set-Cookie"
                              CONTENT="foo=bar;expires=Friday, 05-Sep-08 23:59:59 GMT; path=/">
                              in a page template, would miva merchant set it based on the 5.07 flag for SSL? Or would 5.07 have no effect on cookies set in the page templates?
                              Bill Weiland - Emporium Plus http://www.emporiumplus.com/store.mvc
                              Online Documentation http://www.emporiumplus.com/tk3/v3/doc.htm
                              Question http://www.emporiumplus.com/mivamodu...vc?Screen=SPTS
                              Facebook http://www.facebook.com/EmporiumPlus
                              Twitter http://twitter.com/emporiumplus

                              Comment

                              Working...
                              X