[10616] in bugtraq
Netscape Communicator JavaScript in security vulnerability
daemon@ATHENA.MIT.EDU (Georgi Guninski)
Mon May 24 12:46:36 1999
Mime-Version: 1.0
Content-Type: text/plain; charset=koi8-r
Content-Transfer-Encoding: 7bit
Message-Id: <374936DD.77EC04C9@nat.bg>
Date: Mon, 24 May 1999 14:24:13 +0300
Reply-To: Georgi Guninski <joro@NAT.BG>
From: Georgi Guninski <joro@NAT.BG>
To: BUGTRAQ@NETSPACE.ORG
There is a security bug in Netscape Communicator 4.6 Win95, 4.07 Linux
(guess all 4.x versions are affected) in the way they treat JavaScript
code
in the title of the document.
One may embed JavaScript code in the <TITLE> tag. If the info about the
document
is shown, then the JavaScript code is executed. The info about the
document
may be infoked by a script using 'location="wysiwyg://1/about:document"
'.
The problem is that the JavaScript code is executed in the security
context
of the "about:" protocol. This allows accessing documents in the
"about:"
protocol such as: "about:cache", "about:config", "about:global", etc.
Vulnerabilities:
* Reading user's cache and accessing information such as passwords,
credit card
numbers.
* Reading info about the Netscape's configuration ("about:config").
This includes
finding user's email address, mail servers, the encoded mail password
(it must me saved and may be decoded). This allows reading user's
email.
The more dangerous part is that this vulnerability MAY BE EXPLOITED
USING HTML MAIL MESSAGE.
Workaround: Disable JavaScript
Demonstration is available at: http://www.nat.bg/~joro/titlecache.html
Georgi Guninski
http://www.nat.bg/~joro
http://www.whitehats.com/guninski