mailing list archives
RE: Re: [VulnWatch] Hotmail Advisories
From: "Luis A. Cortes Zavala" <luis.cortes () hypersec co uk>
Date: Wed, 4 May 2005 11:15:10 -0500
The problem here is that since this new window for attachments, you can not
reach the domain for ask cookie, the document.cookie, is empty, you need to
inject innerHTML for ask cookie, but yes it's possible.
The window that opens attachments is not in the same domain so there's not
cookie, so you have to make cross domain code that it's supposed not to be
possible. So first you need to return to your main window and write some
code to have access.
Luis Alberto Cortes Zavala
De: Jerome Athias [mailto:jerome.athias () free fr]
Enviado el: miércoles, 04 de mayo de 2005 7:41
Para: Sherwyn Williams; Luis A. Cortes Zavala;
full-disclosure () lists grok org uk; vulnwatch () vulnwatch org;
bugtraq () securityfocus com
Asunto: Re: [Full-disclosure] Re: [VulnWatch] Hotmail Advisories
Ok I think I get what you are saying, however to use this vuln, would
need to have a script running on a server some where that recieves the
username and password?
Or just based on what you have here this can be possible. If one does not
have knowledge of java script, all the would have to do is use those
various html codes you wrote and send that to them as an attachment, but
how would I get the username and password ????
For example, this is a simple way to steal a cookie:
Inject this code:
And on "your-malware-website" put this page:
and so, the cookie will be logged in "your-malware-website"
I was testing this until I can get some working code, the authorization
validation of the site is one of the better that I seen on a mailing
I never heard about vulnerabilities of hotmail as in others systems, I
have knowledge of two flaws discovered. One on 1999 is from George
and the other when the pwdreset function make its public, every year
is updated, and getting more secure, and it's hard to believe that no one
have found this before.
Try to play with this in hotmail
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/