SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: thecow who started this subject11/19/2002 8:09:03 PM
From: mr.mark   of 110653
 
iDEFENSE Security Advisory 11.19.02c:
idefense.com
Predictable Directory Structure Allows Theft of Netscape Preferences File
November 19, 2002

I. BACKGROUND

Netscape Communications Corp.'s Communicator is a popular web-browsing package that includes a web browser (Navigator), e-mail client, news client, and address book.

II. DESCRIPTION

Socially engineering users of Netscape Communicator 4.x's web browser and e-mail client into clicking on a malicious link could return the contents of the targeted user's preferences file back to a remote attacker.

The attack involves the redefinition of user_pref(), which is an internal
JavaScript function. The redefined function constructs a string of all user
preferences stored in the hidden field of a form and later submitted by
another JavaScript routine. In order for the redefinition to occur, an attacker
must store the exploit script in a Windows (or Samba) share and coerce a
victim into following a link to it. A sample link to an attack script would look
like file:///attacker.example.com/thief.html. Communicator only allows local
files to redefine internal functions.

III. ANALYSIS

Remote exploitation allows an attacker to steal user preferences, including
the victim's real name, e-mail address, e-mail server, URL history and, in
some cases, e-mail password.

IV. DETECTION

Netscape Communicator 4.x is vulnerable. Communicator 6 and later is not
vulnerable, being it stores the prefs.js file in a randomized location.

V. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1204 to this issue.

VI. DISCLOSURE TIMELINE

08/29/2002 Issue disclosed to iDEFENSE
10/14/2002 Netscape notified (support@netscape.com,
info@netscape.com, pradmin@netscape.com)
10/14/2002 iDEFENSE clients notified
10/31/2002 Second attempt at vendor contact
11/07/2002 Third attempt at vendor contact

11/19/2002 Public disclosure

VII. CREDIT

Bennett Haselton (bennett@peacefire.org) discovered this vulnerability.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext