TUCoPS :: Web :: Specific Sites :: hotmail9.htm

Hotmail - injecting Javascript





    Georgi  Guninski  found   following.   Hotmail  allows   executing
    JavaScript code in email messages using

        @import url(http://host/hostile.css)

    which  may  compromise  user's  Hotmail  mailbox  when viewed with
    Internet  Explorer.   Several  months  ago  in his advisory Georgi
    alerted about  a Hotmail  bug with  "@import url(javascript:...)".
    It was  fixed, but  now he  found a  similar bug.   There is a new
    security  flaw  in  Hotmail  which  allows injecting and executing
    JavaScript code  in an  email message  using the  the <STYLE> tag,
    @import and  the "javascript:"  protocol.   This exploit  works on
    Internet Explorer.   Hotmail tries to  filter JavaScript code  for
    security  reasons.   Executing  JavaScript  when  the  user  opens
    Hotmail email message allows  for example displaying a  fake login
    screen where the  user enters his  password which is  then stolen.
    It is also possible to read user's messages, to send messages from
    user's name and doing other mischief.  It is also possible to  get
    the cookie from Hotmail, which is dangerous.  Hotmail deliberately
    escapes all JavaScript  (it can escape)  to prevent such  attacks,
    but obviously there are holes.

    The  following  JavaScript  is  executed  if  embedded  in  a HTML

        <STYLE type=text/css>
        @import url(http://www.nat.bg/~joro/test.css);

    where http://www.nat.bg/~joro/test.css contains:

        @import url(javascript:alert('JavaScript is executed'));


    Disable Active Scripting before viewing a Hotmail message or don't
    use IE.   This bug  was fixed  by MS  on their  servers (including
    Hotmail) as well.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH