-2 vulnerabilities in OWA.
-Vendor contacted

Microsoft Outlook Web Access comes with a feature that
allows script filtering on HTML formatted mail
attachments.It is possible for an attacker to make a
request in a particular way so that OWA does not filter
the attachment causing the script to execute. Be aware
that this is not the same issue of bid 3650 nor
bid 2832... In those attack scenarios the trick seemed
to be a special obfuscated script code that would
bypass the filtering protection of the OWA.

Our attack is based on the fact that it is possible to
force the OWA to not  apply it's filtering engine. 
Microsoft OWA allows the user to view an HTML formatted
attachment. The URL to access the attachment in this
way has a parameter (Security) that, if not 
present in the query, will completely disable any kind
of script filtering. An attacker can trick an OWA user
to make such kind of request with a malicious link in
the body of the message (links are allowed). The
attacker needs to know the IP or the host name of the
Exchange server in order to succefully construct the
link, but all the info the attacker needs can easily be
obatined in te "Referer" header of an HTTP request from
a link in the message body of the vitim. So the attack
procedure will be:

1) a link in message body making a request to the
attacker's box will provide
him the info (in the referer) of the name/ip, etc of
the Exchange.
2) a link in the body of a new message will do the job
of calling for an
attachment without the script filtering feature.

Note: this attack is similar to our "XSS Antivirus
Bypass" of Hotmail:
http://www.infohacking.com/INFOHACKING_RESEARCH/Our_Advisories/Hotmail/index.htm

Bad news are not the XSS, although it provides mail
access, session hijacking,etc... Bad news are that the
Cross Site Scripting present in the OWA allows the
attacker to automatically obtain the domain name,
username and password in of the victim.

The session tracking in the OWA uses cookies and "Basic
Auth", we do not know if there's also any kind of IP
tracking.
The Basic Auth string is the name of the domain, the
username and password base64 encoded...so it is trivial
to decode it.How a to retrieve this info?
The OWA is over an Internet Information Server, wich,
by default, allows "TRACE" method in HTTP requests :-)

A javascript using ActiveX or extended XML can do a
TRACE http request, and send the response (wich has the
"Basic Auth" header content) to the attacker.

So it's important to notice that we are talking of 2
vulnerabilities:

1) Javascript filtering bypass
2) User domain credentials retrieval

User domain credentials can not be encoded in this way
(base64)!!!

This practice is very dangerous, and any future Cross
Site Scripting in the OWA could be used to access those
credentials. 

Soon we will provide a proof of concept exploit to show
how this two vulnerabilities can be exploited toghether
easily.


Hugo Vázquez Caramés & Toni Cortés Martínez
Infohacking Team
http://www.infohacking.com



Reply via email to