webmail attacks question

Ask for help about NoScript, no registration needed to post
curious

webmail attacks question

Post by curious »

Assuming the user’s computer is clean, is it still possible for a malicious remote web server to cause spam to be sent to a NoScript user’s webmail contact list? If so, under what conditions and how? Please let me know.

Over the past 2 months I have had 4 different users on 4 completely unrelated networks with problems related to this issue and would like to narrow down the likely causes, if possible.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11 ( .NET CLR 3.5.30729)
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: webmail attacks question

Post by Giorgio Maone »

curious wrote:Assuming the user’s computer is clean, is it still possible for a malicious remote web server to cause spam to be sent to a NoScript user’s webmail contact list? If so, under what conditions and how? Please let me know.

Over the past 2 months I have had 4 different users on 4 completely unrelated networks with problems related to this issue and would like to narrow down the likely causes, if possible.
You may be running a webmail software which is affected by a stored XSS vulnerability, and it's not isolating message content from the web application itself.
Is it homebrew or something publicly available?
If it's the latter, is it updated to latest version?
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: webmail attacks question

Post by therube »

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.14) Gecko/20100930 SeaMonkey/2.0.9
curious

Re: webmail attacks question

Post by curious »

Ok, Yahoo! Mail is a perfect example. And “stored XSS vulnerability” is certainly a likely culprit, given that various Yahoo! sites (group, flickr, mail, etc) both require users to be signed in, and allow member ‘postings.’ (Thanks Giorgio and therube.)

Given that the steps in the attack, intent of the attack and url of 'Yahoo! Mail' are known in advance, can NoScript add a feature to defend its users’ webmail credentials and mailing capabilities from this? For example, could NoScript have an option to at least require the Yahoo! Mail url be the active tab when the "user" is sending mail from Yahoo! Mail, not flickr or whatever?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.11) Gecko/20101012 Firefox/3.6.11 ( .NET CLR 3.5.30729)
Post Reply