| VID |
21563 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Microsoft Outlook Web Access service is vulnerable to a remote URI redirection vulnerability. Microsoft Outlook Web Access (OWA) service running Windows 2003 could allow a remote attacker to redirect URL requests, which potentially can be exploited by malicious people to conduct phishing attacks. The vulnerability is caused due to a design error in the way OWA uses an unverified user supplied argument to redirect a user after successful authentication. This can be exploited by tricking a user into following a link from a HTML document to the trusted login page with a malicious "url" parameter. After successful authentication, the user will be redirected to the untrusted (fake) site.
* References: http://secunia.com/advisories/14144 http://seclists.org/lists/fulldisclosure/2005/Feb/0106.html http://www.securitytracker.com/alerts/2005/Feb/1013086.html http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0001.html http://exploitlabs.com/files/advisories/EXPL-A-2005-001-owa.txt
* Platforms Affected: Microsoft Outlook Web Access Any version Microsoft Windows 2003 Any version |
| Recommendation |
No upgrade or patch available as of May 2005.
Do not follow links from untrusted sites or emails. |
| Related URL |
CVE-2005-0420 (CVE) |
| Related URL |
12459 (SecurityFocus) |
| Related URL |
19225 (ISS) |
|