Full Disclosure mailing list archives
Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br]
From: "Elazar Broad" <elazar () hushmail com>
Date: Sat, 15 Nov 2008 20:26:45 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 A quick test of OWA 2007 shows that it is not vulnerable... On Sat, 15 Nov 2008 11:36:26 -0500 Micheal Cottingham <techie.micheal () gmail com> wrote:
I found and reported this back in 2005/2006. Microsoft told me that it had been reported previously and that it would be fixed in the next release, which I'm guessing they meant 2007. I do not know if they have fixed it in Exchange 2007. On Sat, Nov 15, 2008 at 5:33 AM, Piergiorgio Venuti <piergiorgio () gigasec org> wrote:Hi all, also I've found this vulnerability 1 year ago during a pt andwork finewith url obfuscation. I've read that with owa 2007 thisvulnerability ispatched but I don't have tried yet. Best regards, Piergiorgio Giuseppe Gottardi ha scritto:Davide, let me comfort you... I found this vulnerability 1 year ago during a penetration test activity and I never reported before for my negligence :-)https://owa/CookieAuth.dll?GetLogon?url=%2Fexchweb%2Fbin%2Fredir.as p%3FURL%3Dhttp%3A%2F%2Fwww.google.it&reason=0Best regards, oveRet On ven, 2008-10-17 at 21:07 +0200, Davide Del Vecchio wrote: Hi,I found and notified this vulnerability to Microsoft in date: Tue, 10 Apr 2007 15:40:13 +0200 You read exactly, April 2007, 1 year and 6 months ago. :( The Microsoft Security Response Center opened the case ID MSRC7368br.The bug has never been patched since 1 year and 6 months. I asked time to time for updates but they always answered methat thebug had to be patched with the next Service Pack and they didnot haveany ETA. This SP has still to be released. They told me that if I released the vulnerability prior to theofficialpatch, I could not be officially credited for that. I toughtit was nota critical vuln, and so I waited. Too much (?). I am a bit sorry for Microsoft, I think they lost an otherchance sincenow I feel a bit tricked. I am not sure if the next time Iwill wait somuch and I am not sure if I will suggest to anyone to wait forthepatch. I just hope Microsoft will credit me in the officialpatch. :(Below you can find the first mail I wrote to MS regarding theissue.Best regards, Davide Del Vecchio. From: "Davide Del Vecchio" <dante () alighieri org> To: secure () microsoft com Subject: Microsoft Outlook Web Access "redir.asp" RedirectionWeaknessDate: Tue, 10 Apr 2007 15:40:13 +0200 Hello, I found a weakness in Microsoft Outlook Web Access (OWA),whichpotentially can be exploited by malicious people to conductphishingattacks. The weakness is caused due to a design error in the way OWAuses anunverified user supplied argument to redirect a user aftersuccessfulauthentication. This can e.g. be exploited by tricking a user into following alink froma HTML document to the trusted login page with a malicious"url" parameter.After successful authentication, the user will be redirectedto theuntrusted (fake) site. The affected product is: Microsoft Outlook Web Access ( OWA ) Windows 2003 Examples: https://[owa-url]/exchweb/bin/redir.asp?URL=http://www.example.comthis will take the user to http://www.example.com when thelogin boxis pressed. https://[owa-url]/exchweb/bin/redir.asp?URL=http://www.example.com/setup.exeprompts the user to download an executable or other file. The attacker can then have a page to capture the user /passwordand redirect back to the original login page or some otherform ofphishing attack. Note that this vulnerability is very similar to the oneaffecting"owalogin.asp" described here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0420 Best regards, Davide Del Vecchio. Martin Suess ha scritto: ...Timeline: --------- Vendor Status: MSRC tracking case closed Vendor Notified: March 31st 2008 Vendor Response: May 6th 2008 Advisory Release: October 15th 2008 Patch available: - (vulnerability not high priority)-- +----------------------------------------------------------------------+| Ing. Piergiorgio Venuti, CCSP|| 0x5ECFE022 - B44B C817 3793 C7C7 2734 F898 DE03 89615ECF E022|+----------------------------------------------------------------------+_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE----- Charset: UTF8 Version: Hush 3.0 Note: This signature can be verified at https://www.hushtools.com/verify wpwEAQECAAYFAkkfdtUACgkQi04xwClgpZj1/gP/VtLOffJOWpY5N8Kn7dmxWmQvUwcE bMr95/K38W+ied5X7apy2Ia+jtpgX8d5A0BcO4qga22bcRB90VDTaG0+/cTsylhq1E0M kfRLs5kJz5As+gAXv28G2sQ8plIDsGkA2eo9dERiuYpH6fvdVnEC3z0B1DnHTcN8mM+G CE+62tc= =7suT -----END PGP SIGNATURE----- -- Click for free info on getting an MBA, $200K/ year potential. http://tagline.hushmail.com/fc/PnY6qxsZwT4rGVHbB4AisvjVw0XZavmA0GT3ROwrGeggWcBAI8H5O/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br] Giuseppe Gottardi (Nov 13)
- Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br] Piergiorgio Venuti (Nov 15)
- Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br] Micheal Cottingham (Nov 15)
- <Possible follow-ups>
- Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br] Elazar Broad (Nov 15)
- Re: MS OWA 2003 Redirection Vulnerability - [MSRC 7368br] Piergiorgio Venuti (Nov 15)
