| 
 | 
         Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/ 
   Multiple vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer
Date Published: 2006-09-07
Last Update: 2006-09-06
Advisory ID: CORE-2006-0322
Bugtraq ID: None currently assigned
CVE Name: None currently assigned
Title: Multiples vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer
Class: Access Validation Error/Design Error, Input validation error
Remotely Exploitable: Yes
Locally Exploitable: Yes
Advisory URL:
http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510 
*Vendors contacted:*
America Online Inc.
 . 2006-07-27: Initial notification sent to vendor, advisory release
   date set for Aug. 14th.
 . 2006-07-27: Vendor response acknowledging notification.
 . 2006-08-11: Request for an update sent to vendor asking for an
   estimated date for fix availability.
 . 2006-08-14: Request for an update sent to vendor asking for an
   estimated date for fix availability, advisory release date now set for
   Aug. 22nd.
 . 2006-08-15: Vendor response received. Still determining when a fix
   will be available. A new update from the vendor forthcoming before
   Aug. 22nd.
 . 2006-08-16: Vendor email received requesting further technical details
   or proof-of-concept code.
 . 2006-08-17: Core response vendor: proof-of-concept for the ICQ client
   bug can not be made available as standalone program without incurring
   in a substantial development effort.
 . 2006-08-21: Vendor email describing coordination issues with ICQ
   development team. No fix schedule provided
 . 2006-08-21: In liue of proof-of-concept, Core provides succinct
   technical explanation of the problem in the ICQ 2003b client.
 . 2006-08-29: Updated advisory sent to vendor requesting comments and
   fix availability information. Advisory release date now set for
   Aug. 31st.
 . 2006-08-30: Vendor response received stating that 30 days is
   insufficient to fix bugs and reiterating the previously noted
   coordination and communications problems with engineering team at
   remote facilities. No tentative fix schedule made available, earliest
   date for an official vendor statement about fixes is Sept. 1st
 . 2006-08-30: Core response to vendor, publication of advisories will be
   delayed until Sept. 6th in order to receive offical statement from
   vendor. Baring a precise schedule that demonstrates an imminent
   release of fixes the publication date is final.
 . 2006-08-30: Vendor provides an official statement.
 . 2006-09-07: Advisory published.
Release Mode: USER RELEASE
*Vulnerability Description:*
 Security problems found in the ICQ Toolbar v1.3 may allow attackers to
 control and change configuration settings and to inject scripting code
 in RSS feed contents and execute it in the contetxt of the feed
 interface (IE's Local Zone)
 ICQ Toolbar 1.3 for Internet Explorer is a Browser Helper Object that
 provides several features including: search, pop-up blocker, ICQmail
 notifier, RSS feeds and others. The ICQ toolbar, is one of the various
 products offered by ICQ and it is available for download at
http://download.icq.com/download/toolbar/ 
 A problem was found in the way the ICQ Toolbar implements its web
 configuration interface that lets attackers controlling a malicious
 website change the ICQ toolbar's configuration settings without users of
 the ICQ toolbar for Internet Explorer noticing that an attack is taking
 place.
 Additionally, Cross Site Scripting vulnerabilities in the RSS Feeds
 interface could allow malicious RSS feeds to execute scripting code in
 the context of the Feeds interface, and allow attackers to access (and,
 in specific cases, change) configuration settings.
*Vulnerable Packages:*
 The following AOL/ICQ software products are affected by these issues:
 Remote configuration vulnerability
 - ICQ Toolbar 1.3 for Internet Explorer
 Malicious RSS feed vulnerability
 - ICQ Toolbar 1.3 for Internet Explorer
 The ICQ Toolbar for Windows 98/ME was not included in our tests.
 Nevertheless, it is likely to be vulnerable.
*Non-vulnerable Packages:*
 - ICQ Search Plugin for Mozilla / Firefox.
*Solution/Vendor Information:*
 Statement provided by AOL Product Vulnerabilities team:
 "AOL has recently been made aware of two vulnerabilities in the various
 versions of the ICQ Toolbar.  Successful exploitation of the first
 vulnerability may allow an attacker to alter non-critical configuration
 information for the Toolbar by tricking a user into visiting a malicious
 website.  The second vulnerability affects versions of the ICQ Toolbar
 that have RSS feed capability.  An attacker may be able to trick a user
 into loading a malicious RSS feed that contains malicious cross-site
 scripting code.
 Solutions / Workarounds:
 Remote configuration vulnerability
 - Users should carefully inspect the source of any web-based
 configuration files they use to configure their ICQ Toolbar.
 Malicious RSS feed vulnerability
 - Users are recommended to use the ICQ Toolbar 1.2 which is packaged
 with ICQ 5.1;  ICQ Toolbar 1.2 does not have RSS feed capability."
*Credits:*
 Luciana Tabo, Lucas Lavarello, Sebastian Cufre, Ezequiel Gutesman and
 Javier Garcia Di Palma from Core Security Technologies discovered and
 tested these vulnerabilities during Core Security=92s Bugweek 2006.
*Technical Description - Exploit/Concept Code:*
[Web configuration Interface]
 The ICQ Toolbar provides a web-based configuration interface that is
 implemented through a plain simple HTML page. Whenever a user clicks on
 =93Toolbar Options,=94 Internet Explorer is directed to a local webpage
 called =93options2.html=94 that resides in the directory where the toolbar
 was installed.
 Most Internet Explorer toolbars in use are now providing web-based
 configuration interfaces that either take you to an online website or,
 as in this case, to a local page. In all of these cases, basic security
 mechanisms must be implemented to prevent attackers from crafting
 malicious web pages that could either change or read toolbar
 configuration settings.
 As mentioned before, the ICQ toolbar configuration web page provides a
 list of standard checklist controls that either enable or disable
 certain toolbar features when checked/unchecked by the user. Whenever
 one of these checklist controls is clicked, the toolbar internally
 handles the onClick event and carries out any corresponding actions.
 The first issue derives from the fact that the ICQ Toolbar isn't
 validating either the location or the originating source from where the
 configuration web page is loaded. Therefore, the toolbar can either be
 configured from the local system (as expected) or from anywhere in the
 online world.
 This enables anyone to simply copy the contents of the locally stored
 =93options2.html=94 file and place it as an html file hosted in any website,
 such as the attacker=92s favorite .com domain.
 Secondly, the way in which each checkbox control is associated to a
 configuration setting is by simply matching the ID attribute of each
 HTML checkbox tag to a list of expected configuration IDs. This enables
 an attacker to change the external representation of a checkbox control
 in order to disguise an attack. As far as the ID attribute matches a
 corresponding configuration setting, the attacker can present to the
 user any HTML for rendering and presentation in the browser. By
 combining both problems, an attacker can easily read and change ICQ
 toolbar configuration settings.
 For example, here is what the checkbox for enabling automatic ICQ
 Toolbar updates looks like in the =91official=92 configuration interface
 (options2.html):
 Update ICQ Toolbar automatically
 The following checkbox will also work the same way:
 I=92m 21 years old or older.
 In such a scenario, a commonly seen disclaimer page with a checkbox is
 used to disguise an attack that changes toolbar settings.
 Although we tried to automate the "clicking" process in order to skip
 the need of having the victim click on the checkbox control, the toolbar
 seems to actually require the user to generate the Click event.
[Cross Site Scripting vulnerabilities in the RSS Feed module]
 Cross Site Scripting vulnerabilities were found in the RSS Feed module
 provided by the ICQ Toolbar for Internet Explorer. The issues emerge at
 the time of displaying items from an RSS feed and could provide
 attackers with a way to access or change configuration settings.
 Specifically, we found the title and description fields of the item
 element included in a standard RSS feed XML document to be =91vulnerable=92
 to Cross Site Scripting vulnerabilities. The issue resides in the fact
 that the application is appending the contents of both fields directly
 in HTML output without first performing any sanitation or encoding on
 them. This would allow an attacker with control on the contents of these
 fields to insert Javascript code that will then be executed in the
 user's browser. We haven=92t tested all possible RSS tags and therefore
 believe more tags may carry the same problem.
 A sample XML document describing a malicious RSS feed would look like
 this: