what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hotmail-xss.txt

hotmail-xss.txt
Posted Oct 16, 2003
Authored by Salman Niksefat

A cross site scripting vulnerability in Microsoft Hotmail allows access to mailboxes via malicious Javascript in conjunction with cookie hijacking.

tags | advisory, javascript, xss
SHA-256 | 8c363ce3f59df1c9afd05297d48999353d73fd24fdf58a30707f45ba78d08d9a

hotmail-xss.txt

Change Mirror Download
New XSS vulnerability in Microsoft Hotmail allows access to mailboxes
Summary:
Hotmail is one of the world's largest providers of free, Web-based e-mail.
Hotmail contains a XSS vulnerability which allows attackers to hijack
another user session, and access to her/his mailbox and other MSN
services. Unlike most XSS attacks, which require a user to click on a
tainted link, exploitation in this case only requires a Hotmail user to
view a malicious e-mail. Sending the e-mail from a forged e-mail address
affords a greater chance for successful exploitation.

Detail:
By sending the following HTML email it's possible to bypass Hotmail
securuity filters and run Javascript code on the client browser.
<xmp><IMG src='test.gif&</xmp><IMG onerror=alert(document.cookie)
src='><IMG src='><IMG src='test.gif&''''>

Analysis:
The idea behind the above HTML code is <XMP> and the single qoutes. Any
html elements between <xmp> tags are just printed to screen and ignored by
browser, so the first single qoute is ignored by the browser, but hotmail
filter thinks it's a valid single qoute for some kind of value. so hotmail
filter ignores the part of code between the first and second qoute, But
the client browser acts diffrently and run the Jscript code.

Running Jscript code gives the attacker the ability to steal the user
cookie. Once a user's Hotmail cookie has been stolen, an attacker has the
ability to gain full control over the user's account until the user logs
out or the session times out. (Hotmail's default setting is to never
timeout). During that time, an attacker could read, remove, and store all
e-mails, as well as send e-mails from the compromised account.

The ability to execute arbitrary Hotmail actions allows an attacker to set
any option that the targeted user could normally set under the Options
menu. This includes redirecting all e-mail to the deleted folder and
modifying the user's name or e-mail signature.

For further information on this class of attacks, refer to "The Evolution
of Cross-Site Scripting Attacks," an iDEFENSE White Paper available at .

Exploit:
In the lab we've developed a working exploit which downloads the Hotmail
INBOX of a user once he/she opens our email. A sample exploit is available
online. It just runs a very simple code of jscript once u open the email.
http://ce.aut.ac.ir/~niksefat/hotmail/hotmail-xss-test.php

Advisory:
The original text could be found here:
http://ce.aut.ac.ir/~niksefat/hotmail/hotmail-xss-report.html

Credits:
This vulnerability has been discovered by Salman
Niksefat(niksefat@ce.aut.ac.ir) BS student of computer engineering at the
university of Amirkabir(www.aut.ac.ir).

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close