Cross-Site-Scripting vulnerabilities in Hushmail.com website -------------- 9/03/2004 -------------- Discovered by: Calum Power [Enune] Versions Affected: <= 8/03/2004 Unaffected versions: 9/03/2004 Vendor: Hush Communications (www.hush.com) Product Description: Hushmail.com is a fast, secure and easy email service. Their products (ranging from basic Webmail to data storage) are used all over the world (and by some of the world's top security experts) as a means of secure data transfer. Summary: Cross-site-scripting vulnerabilities in Hushmail.com website may allow for the manipulation of data available to users. Details: A cross-site-scripting vulnerability exits in the page 'https://www.hushmail.com/about.php'. By manipulating the 'subsec' HTTP/GET variable, a malicious attacker could manipulate the output of the about.php script to trick users into believing that a fraudulent page is legitimate. For example, by manipulating the 'subsec' variable (https://www.hushmail.com/about.php?subsec=) with the below string, an attacker could cause the Hushmail website to output a form, that may trick the user into inputting their login information into a web form, which is then sent to a website of the attackers choice: https://www.hushmail.com/about.php?subsec=');
Username: Password:
Impact: The impact of this vulnerability on a company such as Hushmail could be huge, as their products are marketed as being secure and safe. Attackers could use this vulnerability to 'phish' for user logon details, and possibly compromise encrypted accounts. Acknowledgements: Thanks to the Brian Smith of Hushmail for his speedy response. Hush Communications are definitely dedicated to providing a top level of security and efficiency to their customers. Aloha's: rAchel, Marajin, ValTrum, packetstorm, neworder.box.sk, blacksun.box.sk, Peter Winter-Smith (I like your work =)