lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 4 Oct 2009 19:56:21 -0600
From: PalmPreHacker@...il.com
To: bugtraq@...urityfocus.com
Subject: Palm Pre WebOS <=1.1 Remote File Access Vulnerability

I.  Description

The Palm Pre WebOS <=1.1 suffers from a JavaScript injection attack that allows a malicious attacker to access any file on the mobile device.

Palm has patched this vulnerability and all users are recommended to upgrade to WebOS version 1.2+.  

Palm WebOS 1.2 patch information can be found here: http://kb.palm.com/wps/portal/kb/na/pre/p100eww/sprint/solutions/article/50607_en.html#12

II.  Impact

A specially crafted email can access any file on the Palm Pre WebOS version <=1.1 mobile device and send it to a web site of the attacker's choice just by viewing the email.

III. Details

The Palm Pre WebOS 1.1 and lower will parse and execute JavaScript contained in an email it receives. Exploiting this vulnerability allows an attacker to read/extract any file and post it to a remote website the attacker controls. 

One particular file of interest is the "PalmDatabase.db3" file. Having this database file will give an attacker emails, email addresses, contact list information including names, phone numbers, etc.  Limitations with binary data have been identified, however viewing binary data such as database files is still simple.

Proof of Concept

Creating an email with the following JavaScript in it will automatically upload a file of the attacker's choice to a remote web server:

(Link provided instead of JS code )
 
http://tlhsecurity.com/advisories/FA_Code.jpg

To view a Flash demo of this exploit in action: 

http://tlhsecurity.com/videos/FA.html

IV. About

This vulnerability was discovered by Townsend Ladd Harris <PalmPreHacker[at]gmail.com>

Vulnerability details will be maintained at http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-11-remote-file-access.html

Special Thanks to :
    - Chris Rohlf - Blog: http://em386.blogspot.com/
    - Destinal #webos-internals (irc.freenode.com)
    - Webos-Internals group #webos-internals (irc.freenode.com) http://www.webos-internals.org
    - Bryce Kerley
    - Dan Czarnecki
    - Jeremy Rasmussen
    

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ