Huge Privacy Threats in Webmails and How Big Companies Handle them

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Most webmails have major security holes allowing people to hijack accounts 
from other users. It is then possible to read/destroy emails, and 
read/change preferences, and sometimes (like in the Hotmail case) hack into 
the user's computer. If someone who is authenticated through the webmail 
has access to other web services, it is also possible for the malicious 
hacker to use them (that's why a webmail should never be integrated with 
online auction/bank account/stock exchange...). This is an old and 
well-known issue. But... I want to show that even the biggest companies 
have these security flaws, that are easy to find and easy to fix, but they 
don't really care about them, and I try to understand why.

I focus here on how three different companies handle these privacy threats:
- Microsoft : software developper, provides Internet services through Hotmail.
- Yahoo! : all activities depend on Internet.
- Vizzavi : a web portal from the big european media group Vivendi Universal.

At this time (April 1st 2002), only Hotmail is fixed, although each company 
was contacted more than 3 weeks ago.

This is a special class of security problems since it harms only the end 
user, with stealing of personal data like e-mails. The servers of the 
company providing this web service are not at risk, because the "hack" 
takes place at the level of the user's browser. There is no possibility of 
a global denial of service, no money loss, no intrusion detection so no 
action required from technical staff... So, from a financial point of view, 
there is no need for the companies to put too much money into securing 
their web services. But protecting the end user privacy should be a top 
priority, isn't it ?


WHAT DO COMPANIES DO ?

Warning: I talk only on the basis of my own experience with these 
companies, and I may be wrong...


1) MICROSOFT HOTMAIL [FIXED after 3 months]

- They handle perfectly the relationship with the security community via 
secure@microsoft.com. Their response time is great (from 10 minutes to 24 
hours).
- They have the will to patch this kind of security flaws. And Microsoft 
France seems to care about these issues.
- But they don't care enough ! The hole I found was really easy to find out 
(they could have find it themselves), and their first patch was bad : from 
December 2001 to March 2002, it was possible to steal the e-mails of users 
- and much more.

More about this security hole :
I had found a major security hole in December 2001. Because of a flaw in 
the design of their "malicious html" filter, there was a "magic string" 
that could totally disable this filter when reading an e-mail. This allows 
javascript to be embeded in an evil html message (allowing stealing of the 
session cookie and reading of e-mails), but more frightening is the 
possibility to make the user's browser display any html tag with any 
parameter, like IFRAME, OBJECT, etc. It was then possible to send a virus 
or hack into the hotmail user's computer, by triggering the security holes 
of Internet Explorer.
For more details see vuln-dev: 
http://online.securityfocus.com/archive/82/246989
It took only a week for Microsoft to fix that. I published the 
vulnerability on Internet.

Three months later, I took a look at it and I realized that the fix for 
this public vulnerability had a huge flaw. Fifteen minutes were enough to 
see that there were still a "magic code" disabling the html filter ! It 
seems that nobody cared to test the new filter. Here is this new "magic code" :
<SCRIPT>
</COMMENT>
<!-- --> -->
I used this successfully to inject a trojan horse into the computer of a 
hotmail user running an unpatched version of IE, without knowledge of his 
IP adress or anything except his Hotmail adress... I also downloaded all 
the emails in his mailbox with 1 line of javascript in an e-mail and a 4 
lines cgi script on a webserver. Scaring.
Only two days after I reported it, Microsoft issued a much stronger fix for 
this vulnerability.


2) YAHOO ! MAIL [NOT FIXED]

- They don't have any contact adress, only feedback forms. I submitted 
three different forms but never got any answer.
- By phoning to Yahoo France, I was not allowed to talk to the right 
person. The hotline staff seems not to be educated to care about these 
privacy problemes.
- Sending an official letter to them was the solution. When I could talk to 
the right people, I saw they had the will to patch the holes, and I now 
have the e-mail adress of someone in charge of this at Yahoo.
- But two or three people having a "will" is not enough. It seems to me 
that the company itself don't care if these people do a good job with that, 
and I also think this is not their main job. It took them 3 weeks to make 
correct patches last December... and they patched only one of of the two 
holes we found last month. Yahoo does not seem to have set up a policy 
about the handling of these "privacy problems".
So, it is still possible to read other people's e-mail on Yahoo...

More on this "new" holes we found (in fact, holes found before on other 
websites by other people, but with small changes): it is possible to insert 
a "script" tag into an html message by using these tricks :
<_a<script>  [fixed]
<<script> (this one was found by BugSan)  [NOT fixed]

These codes were sent to Yahoo a month ago and published a week ago in 
France (Hackerz Voice newspaper). Why they fixed only the first one is a 
mystery to me. I hope this post will help to make them issue a fix very 
soon. (since I am not in Paris I don't have the email adress of my contact 
in Yahoo France, but the issue is already public, and the users' accounts 
are still at risk, so there is a need for a quick fix and that's why I am 
posting everything here).


3) VIZZAVI [NOT FIXED]

- They give e-mails adresses for personal contacts on their website 
(Vizzavi officials). Good.
- They did not answer to my emails. And the holes are still there. Bad.
- They have a form to report "bugs". But they did not answer.
- Vivendi Universal did not react to the letters we sent three weeks ago.
- No reaction after the publication in France of these security holes : it 
is still possible to inject javascript into an e-mail with very basic 
things like <b onmousover="...">go here</b> or <img [line_break] 
src="javascript:alert(document.location)"> (the line break is needed to 
bypass a kind of strange filter), etc. [NOTHING fixed]

Unlike Yahoo, Vizzavi is only a portal relying on non-internet activities. 
Unlike Microsoft, the other activities of Vivendi are not computer-related. 
So, they are probably not used to react to this kind of Computer Threats.


TO CONCLUDE: WHAT SHOULD EVERY COMPANY DO ?

- set up an email adress to report security problems, or add a "security" 
topic in their feedback forms.
- educate the hotline staff : these kind of emails/feedback forms/phone 
calls should be given top priority, and transfered quickly to the right person.
- have someone who can and WANT to handle these particular kind of security 
problems (web and privacy).
- have someone who actively tries to detect old and new security problems 
into their web services. Most of the vulnerabilities I can find on many 
webmails are either old ones (months or years), small variations from old 
ones, or new ones - but always very simple and easy to find out.

Every company now have a website. They all want to put dynamic content on 
it, provide web services, attract consumers with a member registration and 
non-free services, etc. Dealing with web security and privacy, and the 
feedback about it from users, is a necessary pain; they will all have to 
define clear policies and contact adresses, think about how to handle 
security bugs reports, how to react... Only Microsoft seems to have begun 
this necessary thinking.


THANKS TO:
Bipeurs and Bugsan who made an investigation for the newspaper "Hackerz 
Voice" (http://www.dmpfrance.com) and found holes in 17 different webmails.


FozZy

Hackademy - Paris.
Hackerz Voice International Edition:
http://www.hackerzvoice.com/inted.html 


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux