New XSS vulnerability in Microsoft Hotmail allows access to mailboxes
Summary:
Hotmail is one of the world's largest providers of free, Web-based e-mail.
Hotmail contains a XSS vulnerability which allows attackers to hijack
another user session, and access to her/his mailbox and other MSN
services. Unlike most XSS attacks, which require a user to click on a
tainted link, exploitation in this case only requires a Hotmail user to
view a malicious e-mail. Sending the e-mail from a forged e-mail address
affords a greater chance for successful exploitation.
Detail:
By sending the following HTML email it's possible to bypass Hotmail
securuity filters and run Javascript code on the client browser.
Analysis:
The idea behind the above HTML code is and the single qoutes. Any
html elements between tags are just printed to screen and ignored by
browser, so the first single qoute is ignored by the browser, but hotmail
filter thinks it's a valid single qoute for some kind of value. so hotmail
filter ignores the part of code between the first and second qoute, But
the client browser acts diffrently and run the Jscript code.
Running Jscript code gives the attacker the ability to steal the user
cookie. Once a user's Hotmail cookie has been stolen, an attacker has the
ability to gain full control over the user's account until the user logs
out or the session times out. (Hotmail's default setting is to never
timeout). During that time, an attacker could read, remove, and store all
e-mails, as well as send e-mails from the compromised account.
The ability to execute arbitrary Hotmail actions allows an attacker to set
any option that the targeted user could normally set under the Options
menu. This includes redirecting all e-mail to the deleted folder and
modifying the user's name or e-mail signature.
For further information on this class of attacks, refer to "The Evolution
of Cross-Site Scripting Attacks," an iDEFENSE White Paper available at .
Exploit:
In the lab we've developed a working exploit which downloads the Hotmail
INBOX of a user once he/she opens our email. A sample exploit is available
online. It just runs a very simple code of jscript once u open the email.
http://ce.aut.ac.ir/~niksefat/hotmail/hotmail-xss-test.php
Advisory:
The original text could be found here:
http://ce.aut.ac.ir/~niksefat/hotmail/hotmail-xss-report.html
Credits:
This vulnerability has been discovered by Salman
Niksefat(niksefat@ce.aut.ac.ir) BS student of computer engineering at the
university of Amirkabir(www.aut.ac.ir).