lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42EDE497.8020703@suramya.com>
Date: Mon, 01 Aug 2005 05:00:07 -0400
From: Suramya Tomar <security@...amya.com>
To: bond.masuda@...ond.com, bugtraq@...urityfocus.com
Subject: Re: Trillian Ver 3.1 saves password's in plain Text


Hi Bond,
  Thanks for confirming this on your end. The login does work, but if 
you are already logged in to your yahoo account when you try to use the 
html file to login it doesn't work. I guess it has something to do with 
the recent change in yahoo's authentication check as it used to work 
earlier.

  I am scared to even look at how it stores other passwords. Personally 
I prefer using gaim. Atleast that is a lot more secure and its 
developers seem to take security a lot more seriously.

Thanks,
  Suramya

> Hi Suramya,
> 
> You are correct. It looks like Trillian creates an HTML page that tries to
> accomplish the login but it doesn't work anyway. Yahoo's login mechanism
> isn't a simple form submit.
> 
> Yet again, another poorly designed application. Now I wonder how it stores
> acct passwords in general. However, it does remove the file when Trillian is
> closed.
> 
> -Bond 
> 
> -----Original Message-----
> From: Suramya Tomar [mailto:security@...amya.com] 
> Sent: Saturday, July 30, 2005 9:49 PM
> To: bond.masuda@...ond.com
> Subject: Re: Trillian Ver 3.1 saves password's in plain Text
> 
> Hi,
>   I tested it on a new install with no changes made to the default config.
> 
> The steps I followed were as follows:
> 
> 1. Install Trillian Pro Trial
> 2. Click on Trillian -> Manage My Connections
> 3. Click on the 'Add new Connection' button
> 4. Choose Yahoo from the list that pops up
> 5. Enter your yahoo username and password
> 6. Click on connect
> 7. Click on Close
> 8. Click on the Little red ball in Trillian
> 9. Choose 'Check Yahoo Mail'
> 
> Now a browser window should open up with your yahoo email account open. 
> If you are quick enough you will see that the browser opens a local html 
> file before transfering to the yahoo account. This is the file you are 
> looking for.
> 
> It is created under the default user directory. On my system it was 
> created in the C:\Program Files\Trillian\users\default\cache directory. 
> and has my username/password in plain text in it.
> 
> Try it out and let me know if you still have problems duplicating it.
> 
> Thanks,
>   Suramya
> 
> 
> 
>>HI Suramya,
>>
>>I tried to verify this on 3.0 b121 too, but I cannot duplicate. The only
>>files I find in the cache directory are png images and some html files
> 
> that
> 
>>are simply links to the yahoo SSL login page. There must be some other
>>setting that is different from yours than mines. Perhaps we can figure
> 
> this
> 
>>out together? Going on your word that this vulnerability exists, I'm
>>thinking the conditions to replicate it are more specific.
>>
>>Sincerely,
>>-Bond Masuda
>>Security Consultant, CISSP
>>-------------------------------------
>>JL Bond Consulting / www.JLBond.com
>>Tel: 619.890.7360
>>Email: bond.masuda@...ond.com
>>
> 
> 
> 


-- 
----------------------------------------------------------
Some days you're the dog; some days you're the hydrant.
----------------------------------------------------------
Name : Suramya Tomar
Homepage URL: http://www.suramya.com
-------------------------------------------------

************************************************************
Disclaimer:
Any errors in spelling, tact, or fact are transmission errors.
************************************************************


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ