lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <456BF1A3.3050909@metaeye.org> Date: Tue, 28 Nov 2006 13:51:55 +0530 From: Metaeye <contact@...aeye.org> To: full-disclosure@...ts.grok.org.uk Subject: Advisory: Redirection Bug In Feeds.MSN Vendor: MSN Severity: Critical Dated: 20 November 2006 Explanation: The feeds.msn website possesses a typical redirection vulnerability. The attacker can manipulate this vulnerability to leverage third party attacks. The traffic can be redirected to the desired destination of attacker's choice. Website: http://feeds.msn.com/content/ca/framesite/frmredir.asp?m=<url> You can check the redirection http://feeds.msn.com/content/ca/framesite/frmredir.asp?m=www.google.com" Vendor Status: Reported. No Response. Not patched. -- MSG http://www.metaeye.org _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/