| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <456BF1A3.3050909@metaeye.org>
Date: Tue, 28 Nov 2006 13:51:55 +0530
From: Metaeye <contact@...aeye.org>
To: full-disclosure@...ts.grok.org.uk
Subject: Advisory: Redirection Bug In Feeds.MSN
Vendor: MSN
Severity: Critical
Dated: 20 November 2006
Explanation:
The feeds.msn website possesses a typical redirection vulnerability.
The attacker can manipulate this vulnerability to leverage third party
attacks. The traffic can be redirected to the desired destination of
attacker's choice.
Website:
http://feeds.msn.com/content/ca/framesite/frmredir.asp?m=<url>
You can check the redirection
http://feeds.msn.com/content/ca/framesite/frmredir.asp?m=www.google.com"
Vendor Status: Reported.
No Response.
Not patched.
--
MSG
http://www.metaeye.org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/