[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BANLkTim0h32a1G6FU1Ekt9J=mPAC4EtFAA@mail.gmail.com>
Date: Fri, 3 Jun 2011 19:57:52 +0200
From: Emilio Pinna <ncl01@...il.it>
To: full-disclosure@...ts.grok.org.uk
Subject: Fastweb MyFastpage Authentication Bypass
Fastweb, an Italian service provider, have a XSS flaw that permits to bypass
authentication and log into users account control panels.
The attacker must lure Fastweb users into a malicious web page to steal
authentication token with XSS. The control panels called MyFastPage permits
to change Fastweb account password, FastMail password, on line billing,
configure home lan portmapping, private datas, address and billing
informations, and buy additional services charging cost to the user.
Here the working POC [italian]: http://disse.cting.org/codes/fastweb.html
Here the blog article [italian]:
http://disse.cting.org/security-2/fastweb-myfastpage-panel-control-hack/
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists