[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030707211954.14903.qmail@www.securityfocus.com>
Date: 7 Jul 2003 21:19:54 -0000
From: Hugo "Vázquez" "Caramés" <overclocking_a_la_abuela@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Domain User Credentials access via OWA XSS
On my previous post about OWA XSS I talked about Cross
Site Scripting in the attachment field of a mail. The
XSS is not in the attachment, is in the body of the
message.
Sorry, I need to sleep...
Please notice: not in the attachment, in the BODY.
To make it clear to understand I have just published on
my site (www.infohacking.com) a report explaining how
to reproduce this bug on a real environment with a
proof of concept exploit.
Our code is able to exploit the XSS on the Outlook Web
Access to show the user cookie and the Windows domain,
username and password in cleartext.
Have fun!
Hugo Vázquez Caramés & Toni Cortés Martínez
Infohacking Research 2003
Barcelona
Spain
Powered by blists - more mailing lists