lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BANLkTimc0O86fpkLbYRQp0Jh2EU9QZ8XHQ@mail.gmail.com>
Date: Sun, 12 Jun 2011 11:30:57 +1000
From: "-= Glowing Doom =-" <secn3t@...il.com>
To: adam <adam@...sy.net>, Christian Sciberras <uuf6429@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: POC for a simple gmail/possible code
 injection into html wich can be executed in an email,
 i will make the PoC code and explain how here and now...

Understtood.. I can handle the fact that this list is very fussy on
speeling..and as i said,i will make it abit easier i hope, in future, if
any, posts.
I did not come here, to have some <censored> , try make a fool of me about
something he obv does NOT understand.

Thankyou for anyone who actually have looked into it alittle.
Sorry for those who hate me :)

Lastly adam,
One of the Pocs, was yes, 'darken' or copy the text you wish to spoof, then
simply backspace but, you must NOT move off the backspaced section,before
adding a link.. again, extremely hard for me to explain.. play with
thunderbird/gmail... I am using gmail, because the bug is possible to happen
in non html, using the backspace method.

Adam, as i said, i should make it in video format next time, specially for
people like you...

jeffrey:
Ahh... so, there IS a problem with the backspace one... there is still the
one that, you just copy , or 'darken' the text, then goto link in (gmail) ,
and enter anything.. Then, have a look at the whole email, plain text...
I will check that up... but, this bug should just not even be possible.. It
is strange one, and, i just cannot explain it.. Thankyou for that ref,ill
check it out.

To others..
if you find the way to somehow recreate the PoC, then maybe you can say all
you wish... It seems, the better people here, actually DO check on things
and test them.
Until i can explain it properly, i aint saying a thing.

Spamming a link, from a site like ryan1918, about a fake mailbomb wich,
apprently i did..with. my major botnet... yes adam, you are very
intellectual.

To the rest of the list, have a nice day. Sorry to show something, wich has
existed for years.. and, do not expect any Poc from me since, i cannot find
them apparently :)

Keep reading ryan1918, you to may even then be as knowledgable as him.
Dru (not Andrew.. or, was it Adrian Blane :s hmm..)



On 12 June 2011 11:19, adam <adam@...sy.net> wrote:

> The actual point to be made, Andrew, is in Christian's last reply. Whether
> it's English or not, it should be properly formatted and consistent. By your
> own admission, it's hard to explain (even *with* you understanding how it
> works). Combine that with the fact that the original post is inconsistent
> and poorly written - and it's going to be borderline impossible for anyone
> to make use of/understand it.
>
> What I don't understand (probably due to the way the original post was
> written) is *how* this really constitutes an injection vulnerability. You
> inserted a hyperlink, removed part (or all?) of said hyperlink and then
> began typing and the final result was a hyperlink?
>
> On Sat, Jun 11, 2011 at 8:06 PM, -= Glowing Doom =- <secn3t@...il.com>wrote:
>
>> This is why i was trying to say, it is hard to re make it and explain it ,
>> in the first post.
>> It is now, over 1yr old atleast and exists in riched20.dll.
>> This PoC info is over for me also.
>> I do not think I will be posting anything to this list, ill watch and
>> learnm from those who seem to have the knowledge about this and could help
>> with it... It does exist, and, it is a client side problem, however, it
>> seems to be accepted by gmail... I used gmail, as the PoC mail-to.
>> Sorry for sharing :s sheesh.
>>
>>
>>
>> On 12 June 2011 11:04, Christian Sciberras <uuf6429@...il.com> wrote:
>>
>>> As Adam said, I'll actually read this when it's been properly analysed.
>>> If it actually does exist, eventually someone will explain it more
>>> formally.
>>> Until that time, the discussion ends here for me.
>>>
>>>
>>>
>>>
>>> On Sun, Jun 12, 2011 at 2:59 AM, -= Glowing Doom =- <secn3t@...il.com>wrote:
>>>
>>>> Grow up? Jesus fucking christ you think people here care about some
>>>> half-assed crap you think you just dug up?
>>>>
>>>> Just dug up ?? I doubt it.. more like, new to the list.
>>>>
>>>> And finally, how does Thunderbird, Outlook relate to Gmail?
>>>> Regarding the dll, so it's first a dll-hunt in those 20+ dlls each of
>>>> those programs load up and now it's all about an RTF editing dll?
>>>> Then let's get back to the POC, which happens to be two crappy links,
>>>> which for some reason you'd believe wouldn't normally show up in an
>>>> email....?
>>>>
>>>> Gmail, was the example mailing system i used.. as ive stated the bug is
>>>> a DLL problem.
>>>> have a nice day sir!
>>>>
>>>>
>>>>
>>>> On 12 June 2011 10:56, Christian Sciberras <uuf6429@...il.com> wrote:
>>>>
>>>>> Grow up? Jesus fucking christ you think people here care about some
>>>>> half-assed crap you think you just dug up?
>>>>> We're all busy and you expect some one would go out of his way
>>>>> verifying (or not) what you think you've found?
>>>>>
>>>>> Here's a crazy though, grow up yourself and put your findings in a well
>>>>> written format, English or not.
>>>>> If you can't help your spelling mistakes get a decent browser and stop
>>>>> using lynx for the lulz.
>>>>>
>>>>> And finally, how does Thunderbird, Outlook relate to Gmail?
>>>>> Regarding the dll, so it's first a dll-hunt in those 20+ dlls each of
>>>>> those programs load up and now it's all about an RTF editing dll?
>>>>>
>>>>> Then let's get back to the POC, which happens to be two crappy links,
>>>>> which for some reason you'd believe wouldn't normally show up in an
>>>>> email....?
>>>>>
>>>>>
>>>>> On Sun, Jun 12, 2011 at 2:49 AM, Jeffrey Walton <noloader@...il.com>wrote:
>>>>>
>>>>>> On Sat, Jun 11, 2011 at 8:45 PM, adam <adam@...sy.net> wrote:
>>>>>> > Somehow, I seriously doubt that.
>>>>>> > The point is, broken English or not - this has to be the most
>>>>>> laughable PoC
>>>>>> > I've ever seen. He originally insists that this is a problem related
>>>>>> to (web
>>>>>> > based?) mail providers (which would lead anyone to believe is server
>>>>>> > related) and then turns around and begins referencing external
>>>>>> libraries
>>>>>> > (that he can't even name?).
>>>>>> > Lastly, before diving face first into his ass - you should have
>>>>>> probably
>>>>>> > performed a Google search. I'll give you a hint, he's not located in
>>>>>> some
>>>>>> > third world country.
>>>>>> Too funny.... Location is distinct from native tongue.
>>>>>> http://www.collegehumor.com/video/5817726/internet-bridge-troll
>>>>>>
>>>>>> Jeff
>>>>>>
>>>>>> > On Sat, Jun 11, 2011 at 7:30 PM, Jeffrey Walton <noloader@...il.com>
>>>>>> wrote:
>>>>>> >>
>>>>>> >> On Sat, Jun 11, 2011 at 8:13 PM, adam <adam@...sy.net> wrote:
>>>>>> >> > When the English version becomes available, please let me know.
>>>>>> >> I'd bet secn3t's english is better than your speaking his native
>>>>>> >> tongue....
>>>>>> >>
>>>>>> >> > On Sat, Jun 11, 2011 at 7:02 PM, -= Glowing Doom =- <
>>>>>> secn3t@...il.com>
>>>>>> >> > wrote:
>>>>>> >> >>
>>>>>> >> >> Systems wich appear vulnerable: EVERY single one i have tried...
>>>>>> >> >>
>>>>>> >> >> How:
>>>>>> >> >>
>>>>>> >> >> I wrote that sentecne, then, i backspaced it and blacked it over
>>>>>> with
>>>>>> >> >> copy
>>>>>> >> >> , then, enter url to wherver i want...
>>>>>> >> >> There is 3 ways i have found todo this, when i dissected one of
>>>>>> them,
>>>>>> >> >> the
>>>>>> >> >> URL/Sentence, was gfull of x41\x41\x41 , very strange... because
>>>>>> it is
>>>>>> >> >> still
>>>>>> >> >> able to be done 3 ways, and the simplest way does NOT require
>>>>>> even html
>>>>>> >> >> 'link' to section, wich is what MST be done, altho on older
>>>>>> emailer
>>>>>> >> >> systems,
>>>>>> >> >> I see that it is simple as backspace over the sentence,then type
>>>>>> the
>>>>>> >> >> url, it
>>>>>> >> >> a'appears' at first , to be a normal deleted sentence, but when
>>>>>> I open
>>>>>> >> >> and
>>>>>> >> >> dissect, it shows URL/41/41/41 then all over the email page,
>>>>>> same thing
>>>>>> >> >> ...
>>>>>> >> >> I know this might be confusing,  I traced the problem to a dll
>>>>>> or lib
>>>>>> >> >> wich
>>>>>> >> >> is for text editing , and that dll is a VERY common one on any
>>>>>> system,
>>>>>> >> >> sofar
>>>>>> >> >> not one mailing system, has NOT had this vuln... yet, i have
>>>>>> seen
>>>>>> >> >> another
>>>>>> >> >> 'version' of this attack type, but, they can ONLY spoof a URL...
>>>>>> This
>>>>>> >> >> one,
>>>>>> >> >> you can make the whole email, a url... i will do this right
>>>>>> now..
>>>>>> >> >>
>>>>>> >> >> [SNIP]
>>>>>> >>
>>>>>> >> _______________________________________________
>>>>>> >> Full-Disclosure - We believe in it.
>>>>>> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>>> >> Hosted and sponsored by Secunia - http://secunia.com/
>>>>>> >
>>>>>> >
>>>>>>
>>>>>> _______________________________________________
>>>>>> Full-Disclosure - We believe in it.
>>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>>
>>>>
>>>>
>>>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ