Re: [Full-disclosure] Phishing using IE7 local resource vulnerability

2007-03-15 Thread avivra
Hi Robert,

Protected Mode and UAC are different security features. 
But even though, it is possible to access local resource (res://) links
with Protected Mode and UAC features enabled. You can test it yourself here:
http://www.raffon.net/research/ms/ie/navcancl/cnn.html or watch the demo
video here: http://raffon.net/videos/ie7navcancl.wmv.
The only way to mitigate this vulnerability by an out-of-the-box security
feature is to set the security level of the Internet Zone to High. This
will disable javascript: links, so the user will not be able to click the
Refresh the page. link in the navcancl.htm local resource page. 
But, I doubt anyone will do that when they can simply just avoid clicking
any link in the Navigation Canceled page.

--Aviv.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] 
Sent: Thursday, March 15, 2007 5:13 PM
To: bugtraq@securityfocus.com
Subject: Re: Phishing using IE7 local resource vulnerability

This appears to be mitigated in Vista by Protected Mode, which is on by
default, and denies access to local resources. If people decide to disable
UAC, they must accept the potential risks that come with it, such as this
XSS attack. I appreciate that this is a valid risk for XP.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Phishing using IE7 local resource vulnerability

2007-03-15 Thread avivra
Indeed. This should work, as Restricted Sites Zone is in High security
level by default.
To correct myself, I meant that this was the only way _I can think of_ to
mitigate this vulnerability using an out-of-the-box security feature. 

--Aviv.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Matthew Murphy
Sent: Thursday, March 15, 2007 11:46 PM
To: avivra
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Phishing using IE7 local resource
vulnerability

On 3/15/07, avivra [EMAIL PROTECTED] wrote:
 Hi Robert,

 Protected Mode and UAC are different security features.
 But even though, it is possible to access local resource (res://) links
 with Protected Mode and UAC features enabled. You can test it yourself
here:
 http://www.raffon.net/research/ms/ie/navcancl/cnn.html or watch the demo
 video here: http://raffon.net/videos/ie7navcancl.wmv.
 The only way to mitigate this vulnerability by an out-of-the-box security
 feature is to set the security level of the Internet Zone to High.
This
 will disable javascript: links, so the user will not be able to click
the
 Refresh the page. link in the navcancl.htm local resource page.
 But, I doubt anyone will do that when they can simply just avoid clicking
 any link in the Navigation Canceled page.

 --Aviv.

On XP SP2 (and probably Vista), you can block the exploitation of this
by disabling script execution for the res:// scheme specifically.
Note that I didn't try blocking the specific resource involved in the
attack.

If you attempt to add res://* or res://ieframe.dll/navcancl.htm to
the Restricted Sites zone, this results in an entry for
about:internet being added.  After doing this, the Refresh the
page text is no longer a clickable link.  Removing the
about:internet entry reverses the change.  It seems that making this
change blocks scripts in ANY resource, even without the wildcard.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Phishing using IE7 local resource vulnerability

2007-03-15 Thread Matthew Murphy
On 3/15/07, avivra [EMAIL PROTECTED] wrote:
 Hi Robert,

 Protected Mode and UAC are different security features.
 But even though, it is possible to access local resource (res://) links
 with Protected Mode and UAC features enabled. You can test it yourself here:
 http://www.raffon.net/research/ms/ie/navcancl/cnn.html or watch the demo
 video here: http://raffon.net/videos/ie7navcancl.wmv.
 The only way to mitigate this vulnerability by an out-of-the-box security
 feature is to set the security level of the Internet Zone to High. This
 will disable javascript: links, so the user will not be able to click the
 Refresh the page. link in the navcancl.htm local resource page.
 But, I doubt anyone will do that when they can simply just avoid clicking
 any link in the Navigation Canceled page.

 --Aviv.

On XP SP2 (and probably Vista), you can block the exploitation of this
by disabling script execution for the res:// scheme specifically.
Note that I didn't try blocking the specific resource involved in the
attack.

If you attempt to add res://* or res://ieframe.dll/navcancl.htm to
the Restricted Sites zone, this results in an entry for
about:internet being added.  After doing this, the Refresh the
page text is no longer a clickable link.  Removing the
about:internet entry reverses the change.  It seems that making this
change blocks scripts in ANY resource, even without the wildcard.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Phishing using IE7 local resource vulnerability

2007-03-14 Thread avivra
Summary
Internet Explorer 7.0 is vulnerable to cross-site scripting in one of its
local resources. In combination with a design flaw in this specific local
resource it is possible for an attacker to easily conduct phishing attacks
against IE7 users.

Affected versions
. Windows Vista - Internet Explorer 7.0
. Windows XP - Internet Explorer 7.0

Workaround / Suggestion
Until Microsoft fixes this vulnerability, do not trust the Navigation
Canceled page!

Technical Details and Proof-of-Concept
Can be found here:
http://aviv.raffon.net/2007/03/14/PhishingUsingIE7LocalResourceVulnerability
.aspx 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Phishing using IE7 local resource vulnerability

2007-03-14 Thread pdp (architect)
quite cool, good work

On 3/14/07, avivra [EMAIL PROTECTED] wrote:
 Summary
 Internet Explorer 7.0 is vulnerable to cross-site scripting in one of its
 local resources. In combination with a design flaw in this specific local
 resource it is possible for an attacker to easily conduct phishing attacks
 against IE7 users.

 Affected versions
 . Windows Vista - Internet Explorer 7.0
 . Windows XP - Internet Explorer 7.0

 Workaround / Suggestion
 Until Microsoft fixes this vulnerability, do not trust the Navigation
 Canceled page!

 Technical Details and Proof-of-Concept
 Can be found here:
 http://aviv.raffon.net/2007/03/14/PhishingUsingIE7LocalResourceVulnerability
 .aspx

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
pdp (architect) | petko d. petkov
http://www.gnucitizen.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/