[LWN Logo]

Date:	Mon, 24 May 1999 14:24:13 +0300
From:	Georgi Guninski <joro@NAT.BG>
Subject:      Netscape Communicator JavaScript in <TITLE> security vulnerability
To:	BUGTRAQ@NETSPACE.ORG

There is a security bug in Netscape Communicator 4.6 Win95, 4.07 Linux
(guess all 4.x versions are affected) in the way they treat JavaScript
code
in the title of the document.

One may embed JavaScript code in the <TITLE> tag. If the info about the
document
is shown, then the JavaScript code is executed. The info about the
document
may be infoked by a script using 'location="wysiwyg://1/about:document"
'.

The problem is that the JavaScript code is executed in the security
context
of the "about:" protocol. This allows accessing documents in the
"about:"
protocol such as: "about:cache", "about:config", "about:global", etc.

Vulnerabilities:
 * Reading user's cache and accessing information such as passwords,
credit card
  numbers.
 * Reading info about the Netscape's configuration ("about:config").
This includes
  finding user's email address, mail servers, the encoded mail password
  (it must me saved and may be decoded). This allows reading user's
email.

The more dangerous part is that this vulnerability MAY BE EXPLOITED
USING HTML MAIL MESSAGE.


Workaround: Disable JavaScript

Demonstration is available at: http://www.nat.bg/~joro/titlecache.html

Georgi Guninski
 http://www.nat.bg/~joro
 http://www.whitehats.com/guninski