exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

aolwebmail_advisory.txt

aolwebmail_advisory.txt
Posted Oct 27, 2004
Authored by Steven | Site lovebug.org

AOL Webmail suffers from cross site scripting flaws.

tags | advisory, xss
SHA-256 | aa11806659a7b31d1900f61f5ac6a0d36b32706fdcc06cc4aae18348d7972568

aolwebmail_advisory.txt

Change Mirror Download
Date:             October 20, 2004
Vendor: America Online Inc.
Product/Service: America Online Webmail
Issue: Cross Site Scripting Vulnerability In Webmail
URL: http://webmail.aol.com | AOL Keyword: webmail
Advisory URL: http://www.lovebug.org/aolwebmail_advisory.txt

Note: While I found these vulnerabilities independently, all credit goes to
iDefense as upon searching I found that this scripting error has previously
been mentioned (sometime ago at that) in a white paper written by iDefense.
This white paper is available at: http://www.cgisecurity.com/lib/XSS.pdf -
However, it appears it is possible the vendor has never been notified and
that this is not a widely published vulnerability. Since this affects the
largest ISP in the world, it might be worth publishing on a larger scale.


Service Overview:

America Online (AOL) is the world's largest Internet Service Provider. They
provide many special online services and features that are only available to
its dialup and high speed add-on subscribers. AOL owns many other companies
to include Netscape, which also contains the same scripting error in its
webmail client.

Exploitation:

A user can craft a URL that when viewed will conduct a Cross Site Scripting
attack. One impact of this attack is that it can give the attacker access
to the users cookies. The flaw lies within msglist.adp?folder=<SCRIPTING>

An example url is as follows:
http://webmail.aol.com/msglist.adp?folder=<script>alert(document.cookie)</script>

Note: A user MUST be logged into webmail for this attack to work. Also,
AOL's webmail is only accessible to subscribers of the AOL service. Please
read the Netscape Webmail advisory to see the differences and who is
affected by that vulnerability.


Solutions:

The script could simply filter and replace special characters or validate
user input so scripts cannot be executed.


Vendor Response:

All previous attempts to alert this vendor to other vulnerabilties,
exploits, and holes have proven to be futile. This error has not been
reported to the vendor for that reason. If this vendor would like to be
notified of future bugs (which there already are) in order to work on a
solution prior to disclosure, they can contact me at: steven@lovebug.org

Credits:

iDefense - and credits go to Link Linkovich for also mentioning and
describing problems with Groups@AOL
---------------------------


Questions/Comments/Other? Drop me a line. Go Hokies! :D


-Steven
steven@lovebug.org

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close