lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 27 May 2005 12:06:33 +0200
From: "ACROS Security" <lists@...os.si>
To: "'Will Schroeder'" <wschroed@...roedernet.net>
Cc: <bugtraq@...urityfocus.com>, <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
Subject: RE: ACROS Security: HTML Injection in BEA WebLogic Server Console (2)


Will,

> To exploit this an admin user still needs to click on a link 
> to a URL right? or is the malicious javascript inserted into 
> the login page via http splitting?

An attacker needs to either trick the admin to visit some web page, or
modify the response of any web server the admin ever connects to (e.g.,
Google). What's important is that he can do this any time _before_ the admin
logs in to WebLogic console, not during an already active administration
session. This makes the attack very easy, at least from my pen-testing
perspective.

Sorry for the delay in replying.

Mitja Kolsek

ACROS, d.o.o.
Makedonska ulica 113
SI - 2000 Maribor, Slovenia
tel: +386 2 3000 280
fax: +386 2 3000 282
web: http://www.acrossecurity.com



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ