exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

webmail-xss.txt

webmail-xss.txt
Posted Nov 3, 2006
Authored by Tal Argoni

The Web Mail platform by "Mirapoint" suffers from a cross site scripting flaw.

tags | advisory, web, xss
SHA-256 | 767f88cb347f5f34a1e7e4bd2604723c8f6953a24971832cb4f47ee069133dcb

webmail-xss.txt

Change Mirror Download

·= Security Advisory =·

Issue: Cross Site Scripting (XSS) Vulnerability in Web Mail platform by
"Mirapoint"
Discovered Date: 19/09/2006
Author: Tal Argoni, LegendaryZion. [talargoni at gmail.com]
Product Vendor: http://www.mirapoint.com/

Details:

Mirapoint Web Mail platform is prone to a Cross Site Scripting
Vulnerability.
The vulnerability exists in filter engine, caused by the lack of Input
Validation/Filtering
of malicious Method "Expression()" of Cascading Style Sheets (CSS).

About Cascading Style Sheets (CSS):

Cascading Style Sheets (CSS) is a stylesheet language used to describe the
presentation
of a document written in a markup language. Its most common application is
to style web pages written
in HTML and XHTML.
English:
http://en.wikipedia.org/wiki/Cascading_Style_Sheets


About Expression() Method:

Receive string that specifies any valid script(JScript, JavaScript,
VBSCript)
statement without quotations or semicolons. This string can include
references to
other properties on the current page. Array references are not allowed on
object
properties included in this script.

<ELEMENT STYLE="AttributeName:expression(Script)">

Exploitation Mail:

...
------=_NextPart_000_0006_01C6DD9E.26B2BBD0
Content-Type: text/html;

<IMG width="0" height="0" style="width: expression(alert('expression'));">
...


Successful exploitation may allow execution of script code. This could also
be exploited
to spoof the entire website's content, stealing cookies, stealing session
ID,
commit Denial Of Service attacks and more...

Proof Of Concept:

<IMG style="width: expression(alert('expression'));">

google it
http://www.google.com/search?num=100&&q=intitle%3A%22Webmail+Direct%22

Israels ISP using the web mail:
015 Internet Zahav - http://smile.msn.co.il/
014 Bezeqint - http://www.bezeqint.net/

Around the globe:
Sigecom - http://www.sigecom.net
BBC Worldwide - http://www.beeb.net/
Oakland - http://www.oakgov.com/
Bank of Shanghai - http://www.bankofshanghai.com/
University of Delaware - http://www.udel.edu/

Thanks,
Tal Argoni, CEH
www.zion-security.com

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close