[20671] in bugtraq

home help back first fref pref prev next nref lref last post

%25c double-parse vulnerability exploitable via email

daemon@ATHENA.MIT.EDU (yehuda)
Wed May 16 13:53:47 2001

Message-ID: <F1DF2E9600D2D4119FF8004033E3F33F0B019B@nyessutton3.essutton.com>
From: yehuda <yehuda@essutton.com>
To: "'bugtraq@securityfocus.com'" <bugtraq@securityfocus.com>
Date: Wed, 16 May 2001 11:58:00 -0400
MIME-Version: 1.0
Content-Type: text/plain

	This may be obvious, but even if a server is not accessible to the
internet, you can exploit it via email. All you need is the following
information:

> 1 - an email address on their network. It must be one that someone will
> read, and the person must be using a reader that renders html mail.
> 2 - the hostname or IP of the win2k server
> 
> all you need to do is craft an html email to your mail user (see 1 above)
> with the %25c double-parse vulnerability as a url in the mail message.
> (Use an img tag so it will run automatically and attempt to download an
> "image".)
> 
> user reads the message, and blammo!
> 
	if an administrator feels he doesn't need to patch his win2k server
because it's not available on the internet, think again.

home help back first fref pref prev next nref lref last post