XSS, Iframe injections and XMLHTTP post request errors on McAfee sitesWritten by [-TE-]-Methodman and DPSunday, 3 May 2009
I think it's not so easy :)
Methodman from Team-Elite (]['€AM€LiT€) has discovered a few vulnerabilities on several McAfee websites. Malicious users can exploit these bugs to infect customers and site visitors with malware, adware and spyware. They can also conduct phishing attacks by redirecting McAfee customers to fake McAfee sites. All bugs are still working and we hope that McAfee security people will fix them as soon as possible.
McAfee has been XSSed multiple times in the past and there has also been a long standing debate over the merits of (or lack thereof) McAfee's Hacker Safe seal (now McAfee Secure).
Server XMLHTTP post request errors
Quote: |
msxml3.dll error '80004005'
A string literal was not closed. redirect[@org='www.mcafee.com/us/enterprise/solutions/network_access_'-->']<--
/error-pages/cls_redirect_lib.asp, line 67 |
|
Iframe Injection
XSS and Iframe Injection
On the same website - http://www.mcafeerebates.com/promocenter/mcafee/promo_search.html - redirect also works fine
Example: - try to put something like this:
in Date Purchased or Rebate Offer Number/Promotion Code: and then click Continue.
You will be redirected to our website. :)
Original News: http://nemesis.te-home.net/News/20090501_Multiple_Bugs_on_Mcafee_Websites_.html
|