Security Basics mailing list archives
Re: Clear text password vulnerability
From: Kevin Conaway <kevin.conaway () gmail com>
Date: Mon, 14 Feb 2005 16:18:44 -0500
Harshil, This is not a vulnerabilty in the webmail service, but rather a side effect of the HTTP protocol. Everything is sent in cleartext. Most webmail services (gmail, yahoo) have the option to conduct your session in HTTPS, eliminating this concern. Kevin On Mon, 14 Feb 2005 09:16:42 -0600, Harshil Parikh <harshil1110 () gmail com> wrote:
Hi, I've been using a web based mail service for sometime. Yesterday I was trying to figure out how the packet exchange occurs between the client and the server by sniffing it. I wanted to know the forking off to different servers for authentication purposes. However, I noticed that the client side would send the password in clear text along with the username. It uses a POST method for this. I think this is a big vulnerability in the mail service. I wanted your opinion if I should term this as a vulnerability or not and whether there is an exploit for this or not. Also one of my friend adviced me to try and charge money for figuring out this vulnerability. Should I go ahead with contacting the sys admin for that ? also is there an exploit that i can point out to the admin that can be used against them... As far as i know..this clear text pwd can be exploited only for the = users in same LAN. Is there any thing else that I can point out to the admin Thanks, Harshil Parikh
Current thread:
- Clear text password vulnerability Harshil Parikh (Feb 14)
- Re: Clear text password vulnerability Twofish -lists (Feb 14)
- Re: Clear text password vulnerability Kevin Conaway (Feb 14)
- Re: Clear text password vulnerability Gautam R. Singh (Feb 15)
- <Possible follow-ups>
- RE: Clear text password vulnerability Ken Hamaker (Feb 14)
- RE: Clear text password vulnerability adisegna (Feb 14)