smtp relay check
mailserver:
e-mail:
more info
translate to ...
language:
 
[1] . [2] . [3] . [4] . [5] . [6] . [7] . [8]
EyeonSecurity
Nekromantic
EyeonSecurity Forums
Ob5cureDotCom
elfqrin swg help net security
frame4 security hacker gurus computerglitch
gotr00t b0iler hackinthebox
nekromantic.com astalavista.net wand products
security-protocols
adv-knowledge rootshell wbglinks
security.nnov.ru
 
Copyright © 2001,2002 eyeonsecurity Inc., All Rights Reserved. No portions of eyeonsecurity may be used without express, written permission
 
Advisory Title: Web Browsers vulnerable to the Extended HTML Form Attack
Release Date: 06/02/2002

Effects:
Internet Explorer 6 and older versions
Opera 6.0 and older versions


Severity:
Allows stealing of cookies, penetration of internal networks and other evil stuff.

Author:
Obscure^
[ obscure@eyeonsecurity.org ]

Vendor Status:
Internet Explorer - Informed secure@microsoft.com and worked with them to release a patch. Should be out soon.
Opera - Worked with the Opera team. A fix is due next release.


Web:

https://www.eyeonsecurity.org/papers/ - Extended HTML Form Attack


Background.

Many web browsers such as Internet Explorer allow forms to be submitted to non-HTTP services. Some non-HTTP
services echo back the information sent, and the web browser renders the echo as an HTML page, regardless
of the protocol behind the service.


Problem.

A malicious user can create a form which is submitted by the victim (automatically using Active Scripting
or manually using Social Engineering). This form can cause a non-HTTP service to echo back JavaScript commands
which in turn allow the malicious user to steal the cookie for that domain.
There are more uses for this attack, other than just stealing cookies.


Exploit Example.

available at https://www.eyeonsecurity.org/advisories/showMyCookie.html
new demo at https://www.eyeonsecurity.org/advisories/extended-form-attack/


Disclaimer.

The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.


Feedback.

Please send suggestions, updates, and comments to:

Eye on Security
mail : obscure@eyeonsecurity.org
web : http://www.eyeonsecurity.org