exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netscapewebmail_advisory.txt

netscapewebmail_advisory.txt
Posted Oct 27, 2004
Authored by Steven | Site lovebug.org

Netscape.net Webmail is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | 9b1f9e465e7432d50eb6a8447f25d19cc5a5eca1095f5f58d2e8c658a7225e7c

netscapewebmail_advisory.txt

Change Mirror Download
Date:             October 20, 2004
Vendor: America Online Inc. | Netscape
Product/Service: Netscape (.net) Webmail
Issue: Cross Site Scripting Vulnerability In Webmail
URL: http://ncmail.netscape.net
Advisory URL: http://www.lovebug.org/netscapewebmail_adivsory.txt

Note: While I found these vulnerabilities independently, all credit goes to
iDefense as upon searching I found that this scripting error has previously
been mentioned (sometime ago at that) in a white paper written by iDefense.
This white paper is available at: http://www.cgisecurity.com/lib/XSS.pdf -
However, it appears it is possible the vendor has never been notified and
that this is not a widely published vulnerability. Since this affects the
largest ISP in the world, it might be worth publishing on a larger scale.


Service Overview:

America Online (AOL) is the world's largest Internet Service Provider. They
provide many special online services and features that are only available to
its dialup and high speed add-on subscribers. AOL owns many other companies
to include Netscape, which also contains the same scripting error in its
webmail client.

Exploitation:

A user can craft a URL that when viewed will conduct a Cross Site Scripting
attack. One impact of this attack is that it can give the attacker access
to the users cookies. The flaw lies within msglist.adp?folder=<SCRIPTING>

An example url is as follows:
http://ncmail.netscape.com/msglist.adp?folder=<script>alert()</script>=&start=1&cmd=deletemsgs

Note: A user MUST be logged into webmail for this attack to work.
NETSCAPE's webmail is accessible and vulnerable to anyone with an AOL
related screen name. This can be an AOL member, AIM user, or netscape.net
user.

Solutions:

The script could simply filter and replace special characters or validate
user input so scripts cannot be executed.


Vendor Response:

All previous attempts to alert this vendor to other vulnerabilties,
exploits, and holes have proven to be futile. This error has not been
reported to the vendor for that reason. If this vendor would like to be
notified of future bugs (which there already are) in order to work on a
solution prior to disclosure, they can contact me at: steven@lovebug.org

Credits:

iDefense - and credits go to Link Linkovich for also mentioning and
describing problems with Groups@AOL
---------------------------


Questions/Comments/Other? Drop me a line. Go Hokies! :D


-Steven
steven@lovebug.org

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close