[ADVISORY] Scripting Vulnerabilities in Indian Email Providers Put Millions At Risk
-----------------------------------------------------------------------------------
I. ABSTRACT:
The email services of several big Indian portals are susceptible to scripting attacks i.e., malicious code can be embedded by attackers into email messages, that, when received by unsuspecting users, can cause harmful effects. The services are Rediffmail.com, Indiatimes.com, Sify.com. The combined user base of these services runs into millions and all of these users are vulnerable. I've known about most of these vulnerabilities for years now and I am now releasing them because many are being massively exploited in the wild. All attempts to contact the vendors were unfruitful.
II. DESCRIPTION AND IMPACT:
It is possible to embed malicious scripts in an ordinary email to users of these services because of certain flaws in their anti-scripting filters. Since, these filters are not as robust as the filters used by service providers like Yahoo and Hotmail, many more flaws, similar to those detailed here, are undoubtedly present in these services. Some of the attacks possible through exploitation of these flaws -
1. User names and passwords can be stolen. Spoofed login pages are one of the many methods to do so.
2. Webpages belonging to the portals can be spoofed, including the shopping cart system.
3. Any action that the legitimate user can take can also be taken by the malicious code. Cookies can be stolen.
4. Malicious programs can be executed when combined with browser vulnerabilities.
5. Force-feeding websites to users. Spammers, phishers and scammers can redirect users to their own pages.
6. A malicious worm can be created which can traverse through the entire user base and cause destruction.
7. Users can be locked out of their inboxes.
III. TECHNICAL DETAILS AND PROOFS OF CONCEPT:
i.Rediffmail(http://rediffmail.com):
-------------------------------------
Rediffmail has the most robust security system among all three. However, it is still susceptible to several attacks -
First vuln: Using a
character as demonstrated below -
Hello!
Second vuln: This service is also susceptible to a script insertion method previously found by Greymagic(http://www.greymagic.com/security/advisories/gm005-mc/). This method uses the HTML+TIME feature of IE. Here is an example(adapted from the Greymagic PoC) -
ii. Indiatimes Mail(http://email.indiatimes.com):
--------------------------------------------------
Indiatimes email does not have a scripting filter in place. This means all HTML tags including scripts can be embedded into the email without any security obstacles. Example:
iii. Sify Mail(http://mail.sify.com):
--------------------------------------
First Vuln: Server side filtering code removes everything between and including the evades filtering.
Second Vuln: There is no filtering in the subject line. Html tags can also be inserted into the subject line of the mail which are then interpreted by the browser. Even