[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
MVSA-10-002 - Google Message Security SaaS - Multiple XSS vulnerabilities
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: MVSA-10-002 - Google Message Security SaaS - Multiple XSS vulnerabilities
- From: marian.ventuneac@xxxxxxxxx
- Date: 15 Sep 2010 20:24:37 -0000
Security Advisory: MVSA-10-002
Vendor: Google
Service: Google Message Security SaaS (powered by Postini)
- Security Console (Admin Console)
- Message Center Classic
- Message Center II
Vulnerabilities: Multiple Cross-Site Scripting (XSS)
Risk: High
Attack Vector: From Remote
Authentication: Required
Reference: http://www.ventuneac.net/security-advisories/MVSA-10-002
http://secureappdev.blogspot.com/2010/09/testing-google-message-security-saas.html
Description
Multiple persistent and reflected Cross-Site Scripting (XSS) vulnerabilities
were identified in Security Console (Admin Console), Message Center Classic and
Message Center II services of Google Message Security (powered by Postini).
When exploited, the identified vulnerabilities could lead to Session Hijack,
Information Disclosure, force installation of malicious file or Trojan on
users' PCs, etc.
Security Console (Admin Console)
--------------------------------
* Persistent XSS: parameter setconf-neworg of /exec/admin_orgs resource
allows an attacker to inject malicious HTML and JavaScript code which is
persistently stored as part of a sub-organization name (ORGS and USERS>Orgs>Add
Sub-Org).
Additionally, an effective DoS attack can be mounted against the
organization's administrators by injecting malicious code which prevents the
Web user interface to render properly.
* Reflected XSS: multiple parameters of /exec/admin_list resource
* Reflected XSS: multiple parameters of /exec/admin_auth resource.
Message Center Classic
----------------------
* Reflected XSS: parameters add-good_address and add-bad_address of
/exec/MsgSet resource.
/exec/MsgSet?action=change_MsgSettings?add-good_addresses=a%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&submit=Save+to+List&submit=Save+to+List
/exec/MsgSet?action=change_MsgSettings?add-bad_addresses=a%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&submit=Save+to+List&submit=Save+to+List
* Reflected XSS: parameters msgid and disp parameters of /exec/MsgCtr
resource.
/exec/MsgCtr?action=display_Message&msgid=" style%3d"display: block; width:
500px; height: 500px; border: 5px solid black"
onmouseover%3d"javascript:alert(1)" yyy&disp=M
When Firefox 3.0.x is used (tested with FF 3.0.1), the attack above allows
rendering visible the hidden INPUT element. Thus, the injected JavaScript code
is successfully executed using onmouseover event.
/exec/MsgCtr?action=display_Message&msgid=yyy&disp=M"
onmouseover%3d"javascript: alert(1)"
Message Center II
-----------------
* Reflected XSS: parameters id and source_uri of /msgctr/message_display
resource.
/msgctr/message_display?id='%3balert(1)%3b//&source_uri=/app/msgctr/junk_quarantine
/msgctr/message_display?id=yyy&trash=trash&source_uri=%2Fapp%2Fmsgctr%2Ftrash%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
Affected Versions
Security Console build 6_24 (January 2010).
Message Center Classic build 6_24 (January 2010).
Message Center II build 6_24 (January 2010), build 6_25 (February 2010), build
6_26 (March 2010) and build 6_27 (April 2010).
Mitigation
Google fixed a first batch of vulnerabilities affecting Security Console and
Message Center Classic in build 6_25 (February 2010).
Additional fixes were included in subsequent releases, with the last fixes
added in build 6_29 (June 2010).
Disclosure Timeline
2010, January 24: Security Console and Message Centre II vulnerabilities
discovered
2010, January 24: Notification sent to Google
2010, January 25: Google acknowledges the vulnerabilities
2010, February 22: Google deploys first set of fixes
2010, April 27: Additional vulnerabilities identified and notification sent to
Google
2010, April 28: Additional vulnerabilities identified and notification sent to
Google
2010, June 21: Google deploys additional fixes
2010, September 15: MVSA-10-002 advisory published.
Credits
Dr. Marian Ventuneac
http://ventuneac.net