Bugtraq mailing list archives
Re: Hotmail Cross Site Scripting Vulnerability
From: "GreyMagic Security" <security () greymagic com>
Date: Sat, 17 Jul 2004 18:33:10 +0200
Hotmail Cross Site Scripting Vulnerability
--snip--
Well, Hotmail was just nice enough to be a little lenient on what goes in-between those 'if' tags. I suppose that's so MS Word can send stuff through email to Hotmail customers without it getting messed up.
The problem is not "if" tags, the problem is the syntax in which they are represented in the document (HTML Comments). Hotmail doesn't check anything between HTML comments because it assumes they won't be processed by the browser, not because it tries to leave backdoors for MSO docs. Hotmail's assumption that HTML comments are safe collides with the well-documented concept of "conditional comments" by the very same company. See http://msdn.microsoft.com/workshop/author/dhtml/overview/ccomment_ovw.asp for more information. Btw, this will work just fine without any need for MSO trickery: <!--[if IE gte 5]> <img src="javascript:alert()"> <![endif]--> Simply checks if IE's major version is equal or greater than 5 and executes the content if true (older versions don't have the conditional comments feature, but they're irrelevant market-share wise anyway). Cheers.
Current thread:
- Hotmail Cross Site Scripting Vulnerability Paul (Jul 17)
- Re: Hotmail Cross Site Scripting Vulnerability GreyMagic Security (Jul 17)
- <Possible follow-ups>
- Re: Hotmail Cross Site Scripting Vulnerability Andrew Hunter (Jul 17)