exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

GM006-MC.txt

GM006-MC.txt
Posted Jun 3, 2004
Site greymagic.com

GreyMagic Security Advisory GM#006-MC - GreyMagic discovered that by sending a maliciously formed email to a Yahoo user it is possible to circumvent the filter and execute script in the context of a logged-in Yahoo! user due to a cross site scripting flaw.

tags | advisory, xss
SHA-256 | b68af6d21ce14685b4eb42ae8efb1c84859267ea5fe66cfc86989825728682c8

GM006-MC.txt

Change Mirror Download
GreyMagic Security Advisory GM#006-MC
=====================================

GreyMagic Software, 03 Jun 2004.

Available in HTML format at
http://www.greymagic.com/security/advisories/gm006-mc/.

Topic: Simple Yahoo! Mail Cross-Site Scripting.

Discovery date: 16 May 2004.

Affected applications:
======================

* Yahoo! web-based email service.


Introduction:
=============

Web-based email services and Yahoo! specifically make tremendous efforts to
sanitize incoming emails from potentially unsafe HTML content. Flawed
filtering of such unsafe content may result in severe consequences that
would occur as soon as a user opens an email for reading, including:

* Theft of login and password.
* Content disclosure of any email in the mailbox.
* Automatically send emails from the mailbox.
* Exploitation of known vulnerabilities in the browser to access the user's
file system and eventually take over the machine.
* Distribution of a web-based email worm.
* Disclosure of all contacts within the address book.


Discussion:
===========

GreyMagic discovered that by sending a maliciously formed email to a Yahoo
user it is possible to circumvent the filter and execute script in the
context of a logged-in Yahoo! user.

A known Cross-Site Scripting weakness is using entities instead of actual
chars, for example: "jav&#97script:alert()". There is also a variation of
that weakness, caused by the way browsers ignore white-space chars in URLs:
"java script:alert()". Yahoo! properly filters both of these scenarios.

However, a third variation remains unfiltered. It is possible to embed a
javascript URL by using a white-space entity with multiple zero chars in
front of it: "java script:alert()".


Exploit:
========

The following HTML embedded in an email would show a Yahoo! user's cookie
when opened:

<div
style="background-image:url(jav ascript:alert(document.cookie))">Hel
lo!</div>


Solution:
=========

GreyMagic informed Yahoo! of the vulnerability on 20-May-2004. Yahoo!
responded promptly and reported that it patched the vulnerability on
24-May-2004.


Tested on:
==========

Yahoo! web-based email service.


Disclaimer:
===========

The information in this advisory and any of its demonstrations is provided
"as is" without warranty of any kind.

GreyMagic Software is not liable for any direct or indirect damages caused
as a result of using the information or demonstrations provided in any part
of this advisory.

- Copyright © 2004 GreyMagic Software.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close