Assuming the user’s computer is clean, is it still possible for a malicious remote web server to cause spam to be sent to a NoScript user’s webmail contact list? If so, under what conditions and how? Please let me know.
Over the past 2 months I have had 4 different users on 4 completely unrelated networks with problems related to this issue and would like to narrow down the likely causes, if possible.
webmail attacks question
webmail attacks question
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11 ( .NET CLR 3.5.30729)
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: webmail attacks question
You may be running a webmail software which is affected by a stored XSS vulnerability, and it's not isolating message content from the web application itself.curious wrote:Assuming the user’s computer is clean, is it still possible for a malicious remote web server to cause spam to be sent to a NoScript user’s webmail contact list? If so, under what conditions and how? Please let me know.
Over the past 2 months I have had 4 different users on 4 completely unrelated networks with problems related to this issue and would like to narrow down the likely causes, if possible.
Is it homebrew or something publicly available?
If it's the latter, is it updated to latest version?
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11
Re: webmail attacks question
Thinking his issue is more like Yahoo! accounts getting hacked or Spam Being Sent From My Email Account ?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.14) Gecko/20100930 SeaMonkey/2.0.9
Re: webmail attacks question
Ok, Yahoo! Mail is a perfect example. And “stored XSS vulnerability” is certainly a likely culprit, given that various Yahoo! sites (group, flickr, mail, etc) both require users to be signed in, and allow member ‘postings.’ (Thanks Giorgio and therube.)
Given that the steps in the attack, intent of the attack and url of 'Yahoo! Mail' are known in advance, can NoScript add a feature to defend its users’ webmail credentials and mailing capabilities from this? For example, could NoScript have an option to at least require the Yahoo! Mail url be the active tab when the "user" is sending mail from Yahoo! Mail, not flickr or whatever?
Given that the steps in the attack, intent of the attack and url of 'Yahoo! Mail' are known in advance, can NoScript add a feature to defend its users’ webmail credentials and mailing capabilities from this? For example, could NoScript have an option to at least require the Yahoo! Mail url be the active tab when the "user" is sending mail from Yahoo! Mail, not flickr or whatever?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11 ( .NET CLR 3.5.30729)