Huge Privacy Threats in Webmails and How Big Companies Handle them

From: FozZy (FozZyat_private)
Date: Mon Apr 01 2002 - 10:41:17 PST

  • Next message: Simon Loader: "SASL (v1/v2) MYSQL/LDAP authentication patch."

    Most webmails have major security holes allowing people to hijack accounts 
    from other users. It is then possible to read/destroy emails, and 
    read/change preferences, and sometimes (like in the Hotmail case) hack into 
    the user's computer. If someone who is authenticated through the webmail 
    has access to other web services, it is also possible for the malicious 
    hacker to use them (that's why a webmail should never be integrated with 
    online auction/bank account/stock exchange...). This is an old and 
    well-known issue. But... I want to show that even the biggest companies 
    have these security flaws, that are easy to find and easy to fix, but they 
    don't really care about them, and I try to understand why.
    
    I focus here on how three different companies handle these privacy threats:
    - Microsoft : software developper, provides Internet services through Hotmail.
    - Yahoo! : all activities depend on Internet.
    - Vizzavi : a web portal from the big european media group Vivendi Universal.
    
    At this time (April 1st 2002), only Hotmail is fixed, although each company 
    was contacted more than 3 weeks ago.
    
    This is a special class of security problems since it harms only the end 
    user, with stealing of personal data like e-mails. The servers of the 
    company providing this web service are not at risk, because the "hack" 
    takes place at the level of the user's browser. There is no possibility of 
    a global denial of service, no money loss, no intrusion detection so no 
    action required from technical staff... So, from a financial point of view, 
    there is no need for the companies to put too much money into securing 
    their web services. But protecting the end user privacy should be a top 
    priority, isn't it ?
    
    
    WHAT DO COMPANIES DO ?
    
    Warning: I talk only on the basis of my own experience with these 
    companies, and I may be wrong...
    
    
    1) MICROSOFT HOTMAIL [FIXED after 3 months]
    
    - They handle perfectly the relationship with the security community via 
    secureat_private Their response time is great (from 10 minutes to 24 
    hours).
    - They have the will to patch this kind of security flaws. And Microsoft 
    France seems to care about these issues.
    - But they don't care enough ! The hole I found was really easy to find out 
    (they could have find it themselves), and their first patch was bad : from 
    December 2001 to March 2002, it was possible to steal the e-mails of users 
    - and much more.
    
    More about this security hole :
    I had found a major security hole in December 2001. Because of a flaw in 
    the design of their "malicious html" filter, there was a "magic string" 
    that could totally disable this filter when reading an e-mail. This allows 
    javascript to be embeded in an evil html message (allowing stealing of the 
    session cookie and reading of e-mails), but more frightening is the 
    possibility to make the user's browser display any html tag with any 
    parameter, like IFRAME, OBJECT, etc. It was then possible to send a virus 
    or hack into the hotmail user's computer, by triggering the security holes 
    of Internet Explorer.
    For more details see vuln-dev: 
    http://online.securityfocus.com/archive/82/246989
    It took only a week for Microsoft to fix that. I published the 
    vulnerability on Internet.
    
    Three months later, I took a look at it and I realized that the fix for 
    this public vulnerability had a huge flaw. Fifteen minutes were enough to 
    see that there were still a "magic code" disabling the html filter ! It 
    seems that nobody cared to test the new filter. Here is this new "magic code" :
    <SCRIPT>
    </COMMENT>
    <!-- --> -->
    I used this successfully to inject a trojan horse into the computer of a 
    hotmail user running an unpatched version of IE, without knowledge of his 
    IP adress or anything except his Hotmail adress... I also downloaded all 
    the emails in his mailbox with 1 line of javascript in an e-mail and a 4 
    lines cgi script on a webserver. Scaring.
    Only two days after I reported it, Microsoft issued a much stronger fix for 
    this vulnerability.
    
    
    2) YAHOO ! MAIL [NOT FIXED]
    
    - They don't have any contact adress, only feedback forms. I submitted 
    three different forms but never got any answer.
    - By phoning to Yahoo France, I was not allowed to talk to the right 
    person. The hotline staff seems not to be educated to care about these 
    privacy problemes.
    - Sending an official letter to them was the solution. When I could talk to 
    the right people, I saw they had the will to patch the holes, and I now 
    have the e-mail adress of someone in charge of this at Yahoo.
    - But two or three people having a "will" is not enough. It seems to me 
    that the company itself don't care if these people do a good job with that, 
    and I also think this is not their main job. It took them 3 weeks to make 
    correct patches last December... and they patched only one of of the two 
    holes we found last month. Yahoo does not seem to have set up a policy 
    about the handling of these "privacy problems".
    So, it is still possible to read other people's e-mail on Yahoo...
    
    More on this "new" holes we found (in fact, holes found before on other 
    websites by other people, but with small changes): it is possible to insert 
    a "script" tag into an html message by using these tricks :
    <_a<script>  [fixed]
    <<script> (this one was found by BugSan)  [NOT fixed]
    
    These codes were sent to Yahoo a month ago and published a week ago in 
    France (Hackerz Voice newspaper). Why they fixed only the first one is a 
    mystery to me. I hope this post will help to make them issue a fix very 
    soon. (since I am not in Paris I don't have the email adress of my contact 
    in Yahoo France, but the issue is already public, and the users' accounts 
    are still at risk, so there is a need for a quick fix and that's why I am 
    posting everything here).
    
    
    3) VIZZAVI [NOT FIXED]
    
    - They give e-mails adresses for personal contacts on their website 
    (Vizzavi officials). Good.
    - They did not answer to my emails. And the holes are still there. Bad.
    - They have a form to report "bugs". But they did not answer.
    - Vivendi Universal did not react to the letters we sent three weeks ago.
    - No reaction after the publication in France of these security holes : it 
    is still possible to inject javascript into an e-mail with very basic 
    things like <b onmousover="...">go here</b> or <img [line_break] 
    src="javascript:alert(document.location)"> (the line break is needed to 
    bypass a kind of strange filter), etc. [NOTHING fixed]
    
    Unlike Yahoo, Vizzavi is only a portal relying on non-internet activities. 
    Unlike Microsoft, the other activities of Vivendi are not computer-related. 
    So, they are probably not used to react to this kind of Computer Threats.
    
    
    TO CONCLUDE: WHAT SHOULD EVERY COMPANY DO ?
    
    - set up an email adress to report security problems, or add a "security" 
    topic in their feedback forms.
    - educate the hotline staff : these kind of emails/feedback forms/phone 
    calls should be given top priority, and transfered quickly to the right person.
    - have someone who can and WANT to handle these particular kind of security 
    problems (web and privacy).
    - have someone who actively tries to detect old and new security problems 
    into their web services. Most of the vulnerabilities I can find on many 
    webmails are either old ones (months or years), small variations from old 
    ones, or new ones - but always very simple and easy to find out.
    
    Every company now have a website. They all want to put dynamic content on 
    it, provide web services, attract consumers with a member registration and 
    non-free services, etc. Dealing with web security and privacy, and the 
    feedback about it from users, is a necessary pain; they will all have to 
    define clear policies and contact adresses, think about how to handle 
    security bugs reports, how to react... Only Microsoft seems to have begun 
    this necessary thinking.
    
    
    THANKS TO:
    Bipeurs and Bugsan who made an investigation for the newspaper "Hackerz 
    Voice" (http://www.dmpfrance.com) and found holes in 17 different webmails.
    
    
    FozZy
    
    Hackademy - Paris.
    Hackerz Voice International Edition:
    http://www.hackerzvoice.com/inted.html 
    



    This archive was generated by hypermail 2b30 : Tue Apr 02 2002 - 22:23:33 PST