[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Security issue in Microsoft Outlook



On Wed, May 18, 2005 at 01:27:45PM -0700, Bakchodiya wrote:
> An issue has been discovered in MS Outlook (All
> Versions) where anyone can fake a URL & send it
> across.
> 
> How does it work:
> 
> Lets compose an email in MS Outlook, lets type
> 
> 
> http://www.cybertrion.com & put a space after it to
> make it a link. Now put your cursor just before
> cybertrion & type any URL for eg: 
> http://www.foo-labs.info now send it to anyone. The
> receiver will see the URL as http://www.foo-labs.info
> but when he clicks on it it will directly take him to
> http://www.cybertrion.com
> 
> I am not sure how critical this is but it can fool
> alot of people & result in download of a virus.

Wow. MS really fucked up on this one. 

FYI, though, I've confirmed this vulnerability on Outlook 2003, IE6,
and, shockingly, Mozilla Thunderbird, Firefox, Opera, and Safari. In
fact, it almost seems as if *every* browser or other application that
renders HTML has this "feature" of displaying the text inside a <a> tag!

I, for one, am shocked and apalled that anyone could be so irresponsible
as to write such a vulnerability into production code. By allowing
links in their HTML pages, application writers make it trivially easy to
trick viewers into visiting web sites they didn't intend to! This can
lead to phishing attacks, viruses, widespread panic, and mass hysteria! 

Severity ranking: High!

PS: If you weren't talking about just changing the link text, I
apologize for the above sarcasm. 

-- 
Dan
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/