Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Apps :: valuec~1.txt

ValueClick CGI Vulnerability




Date: Sat, 19 Dec 1998 17:19:34 +0200
From: Philip Stoev <philip@EINET.BG>
Reply-To: Bugtraq List <BUGTRAQ@netspace.org>
To: BUGTRAQ@netspace.org
Subject: ValueClick CGI Vulnerability

    [ The following text is in the "KOI8-R" character set. ]
    [ Your display is set for the "US-ASCII" character set.  ]
    [ Some characters may be displayed incorrectly. ]

The ValueClick Online Advertising agency web interface has a CGI
vulnerability that allows easy username/password capture without using
sniffing software.

When you go to ValueClick home page (www.valueclick.com) and log on, your
username and password are embedded in the URL and if you subsequently leave
their site and go somewhere else, this URL will end up in this site's HTTP
refferer log which I beleive is a serious fault because one can easily not
just garble with your account, but also redirect any cheques you are about
to receive from ValueClick to himself.

ValueClick was notified several months ago and they responded they will
substitute GET with POST in their CGI, but they have taken no such action.

Sincerely,

Philip Stoev

-- Free SAT & TOEFL preparation softwate @ http://studywiz.hypermart.net
This message was sent by Philip Stoev (philip@einet.bg)
tel: (359 2) 715949, 9549488 fax: (359 2) 544669

-------------------------------------------------------------------------

Date: Sat, 19 Dec 1998 19:57:20 -0500
From: "Ellen (ValueClick)" <ellen@VALUECLICK.COM>
Reply-To: Bugtraq List <BUGTRAQ@netspace.org>
To: BUGTRAQ@netspace.org
Subject: ValueClick

Hi,

Please allow me to introduce myself.  My name is Ellen O'Rourke and I am
Host Member Manager for ValueClick.

I would like to refer to the letter you wrote BUGTRAQ@NETSPACE.ORG
regarding "ValueClcik vernerability."

Let me explain:

If the user decides to go to another site after they
are logged in,  either via a bookmark or typing in
a url, the referring url will be blank.  If we had
a link to the outside, the referring url would
contain the logged in user's username and password.

The links that we do have to the outside, such
as on the exclude banners page where a user
can click on a banner to view the advertiser's
site, have the referring url stripped off to
protect the host's login info.

If you have evidence that contradicts this, we would very much appreciate
your advising us.

We appreciate your interest in ValueClick.

---------------------------------------------------------
                   Ellen O'Rourke
Member Site Manager                ellen@valueclick.com
                     ValueClick
        The pay-for-results advertising network!

ValueClick Banner Ad Network       http://www.valueclick.com


---------------------------------------------------------

-------------------------------------------------------------------------

Date: Sat, 19 Dec 1998 18:47:56 -0800
From: Trev <trev@KICS.BC.CA>
Reply-To: Bugtraq List <BUGTRAQ@netspace.org>
To: BUGTRAQ@netspace.org
Subject: Re: ValueClick

Hi Ellen

Perhaps you haven't heard of the Brumleve cache bug, or the other various
ways remote websites can gather the information in your browser's history.
It is so simple to use POST instead of GET... I don't see why you want to
take the chance of it being intercepted.  There are a number of ways that
requested URLs can be logged etc.

Trev



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH