[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000601c6fd1d$0cd51d50$6502a8c0@zionsecutiy>
Date: Tue, 31 Oct 2006 18:34:45 +0200
From: "LegendaryZion" <moskito@...le.net.il>
To: <bugs@...uritytracker.com>, "BugTraq" <bugtraq@...urityfocus.com>,
<news@...uriteam.com>, <full-disclosure@...ts.grok.org.uk>
Subject: Cross Site Scripting (XSS) Vulnerability in Web
Mail platform by "Mirapoint"
·= Security Advisory =·
Issue: Cross Site Scripting (XSS) Vulnerability in Web Mail platform by
"Mirapoint"
Discovered Date: 19/09/2006
Author: Tal Argoni, LegendaryZion. [talargoni at gmail.com]
Product Vendor: http://www.mirapoint.com/
Details:
Mirapoint Web Mail platform is prone to a Cross Site Scripting
Vulnerability.
The vulnerability exists in filter engine, caused by the lack of Input
Validation/Filtering
of malicious Method "Expression()" of Cascading Style Sheets (CSS).
About Cascading Style Sheets (CSS):
Cascading Style Sheets (CSS) is a stylesheet language used to describe the
presentation
of a document written in a markup language. Its most common application is
to style web pages written
in HTML and XHTML.
English:
http://en.wikipedia.org/wiki/Cascading_Style_Sheets
About Expression() Method:
Receive string that specifies any valid script(JScript, JavaScript,
VBSCript)
statement without quotations or semicolons. This string can include
references to
other properties on the current page. Array references are not allowed on
object
properties included in this script.
<ELEMENT STYLE="AttributeName:expression(Script)">
Exploitation Mail:
...
------=_NextPart_000_0006_01C6DD9E.26B2BBD0
Content-Type: text/html;
<IMG width="0" height="0" style="width: expression(alert('expression'));">
...
Successful exploitation may allow execution of script code. This could also
be exploited
to spoof the entire website's content, stealing cookies, stealing session
ID,
commit Denial Of Service attacks and more...
Proof Of Concept:
<IMG style="width: expression(alert('expression'));">
google it
http://www.google.com/search?num=100&&q=intitle%3A%22Webmail+Direct%22
Israels ISP using the web mail:
015 Internet Zahav - http://smile.msn.co.il/
014 Bezeqint - http://www.bezeqint.net/
Around the globe:
Sigecom - http://www.sigecom.net
BBC Worldwide - http://www.beeb.net/
Oakland - http://www.oakgov.com/
Bank of Shanghai - http://www.bankofshanghai.com/
University of Delaware - http://www.udel.edu/
Thanks,
Tal Argoni, CEH
www.zion-security.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists