TUCoPS :: Web :: Specific Sites :: hotmail4.htm

Hotmail - injecting Javascript
Vulnerability

    hotmail

Affected

    Hotmail

Description

    Georgi Guninski found  yet another major  Hotmail security hole  -
    injecting  JavaScript  using  "javasCript.   There  is  a major
    security  flaw  in  Hotmail  which  allows injecting and executing
    JavaScript code in an email message using the javascript protocol.
    This exploit works  both on Internet  Explorer 5.0 (guess  IE 4.x)
    and Netscape Communicator 4.x.  Hotmail filters the  "javascript:"
    protocol for security  reasons.  But  it does not  filter properly
    the following  case: "javasCript:"  where "C"  is the  ASCII
    code of "C".  So the following HTML is executed

        <IMG SRC="javasCript:alert('JavaScript is executed');">

    if  the  user  has  enabled  automatically loading of images (most
    users  have).   Probably  this  may  be  used  in other HTML tags.
    Executing JavaScript  when the  user opens  Hotmail email  message
    allows for example displaying a  fake login screen where the  user
    enters his password which is then stolen.  No scary demonstration,
    but guess is that it is also possible to read user's messages,  to
    send messages from user's name and doing other mischief.   Hotmail
    deliberately escapes  all JavaScript  (it can  escape) to  prevent
    such attacks, but obviously there are holes.  It is much easier to
    exploit this vulnerability if the user uses Internet Explorer 5.0.
    This is not a browser problem, it is Hotmail's problem.  The  code
    is:

        <IMG SRC="javasCript:alert('JavaScript is
        executed');a=window.open(document.links[2]);setTimeout('alert(\'The
        first message in your Inbox is from :
        \'+a.document.links[26].text)',20000)">

Solution

    Workaround: Disable JavaScript

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH