AOH :: HP Unsorted I :: BT-21490.HTM

ICQ 6.5 HTML-injection vulnerability



ICQ 6.5 HTML-injection vulnerability
ICQ 6.5 HTML-injection vulnerability



ShineShadow Security Report  14082009-08=0D
=0D
TITLE =0D
=0D
ICQ 6.5 HTML-injection vulnerability=0D
=0D
BACKGROUND =0D
=0D
With more than 700 million instant messages sent and received every day, ICQ has been known to the online community as a messaging service. Today, a little more than a decade after the first ICQ instant messaging service was launched it has become much more than just that. =0D
ICQ is a personal communication tool that allows users to meet and interact through instant messaging services such as text, voice, video and VoIP as well as various entertainment and community products. =0D
=0D
Source: http://www.icq.com=0D 
=0D
VULNERABLE PRODUCTS =0D
=0D
ICQ 6.5 build 1042 (latest build)=0D
Previous versions and localized distributions may also be affected=0D
=0D
DETAILS =0D
=0D
HTML-injection vulnerability exists in official ICQ client software. Incoming message window in the vulnerable ICQ client has a web browser nature. An attacker can try to exploit the vulnerability by sending specially crafted message to the remote ICQ client. The malicious message can contain text data which will be interpreted and displayed in the incoming message window as a HTML code. Potentially an arbitrary HTML code could be injected.=0D
There are two impacts of the vulnerability has been detected:=0D
1.Information disclosure=0D
For example, an attacker can inject  tag that could lead information disclosure (such as remote client=92s IP address, browser version, OS version, etc.)=0D
2.Spoofing=0D
An attacker can spoof ICQ client software=92s system messages, interface elements (buttons, links) in the message window, etc. For example, it could be used for forcing of the ICQ users to click on attacker=92s malicious link.=0D
Maybe other impacts are possible.=0D
=0D
EXPLOITATION =0D
=0D
Remote attacker can exploit this vulnerability using any instant messenger software with OSCAR (ICQ) protocol support by sending specially crafted message.=0D
Example of exploit message:=0D
file://1">[HTML CODE]=0D
Notice that internal ICQ antispam engine will blocked some text/html data if attacker=92s ICQ UIN not in user=92s ICQ contact list.=0D
=0D
DISCLOSURE POLICY=0D
=0D
The =93Full disclosure=94 policy has been applied. Vendor has not been contacted.=0D
=0D
CREDITS =0D
=0D
Maxim A. Kulakov (aka ShineShadow)=0D
ss_contacts@hotmail.com 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.