search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Outlook Web Access contains vulnerability in HTML redirection query

Vulnerability Note VU#948750

Original Release Date: 2004-08-11 | Last Revised: 2004-08-11

Overview

A cross-site scripting vulnerability in Microsoft Exchange 5.5 Outlook Web Access (OWA) could allow an attacker to execute arbitrary scripting code in the victim's browser.

Description

Outlook Web Access (OWA) is a component of Microsoft Exchange. By using OWA, a server that is running Exchange Server can also function as a website that lets authorized users read or send email messages, manage their calendar, or perform other mail functions over the Internet by using a web browser. A cross-site scripting vulnerability exists in the way OWA validates user input provided to an HTML redirection query.

By convincing a user to click on a specially crafted URL within an email message, an attacker could cause arbitrary scripting code to be executed in the victim's browser. If executed, the script would have all privileges of the OWA user, including access to and manipulation of messages and folders on the server.

Impact

If an attacker can convince a user to follow a link, the attacker could execute script as the victim in the context of the zone in which the Outlook Web Access server resides. For example, this could permit the attacker to gain access to messages stored on the server.
According to the Microsoft Security Bulletin:
It may also be possible to exploit the vulnerability to manipulate Web browser caches and intermediate proxy server caches and put spoofed content in those caches.

Solution

Apply patch

Apply a patch as described in Microsoft Security Bulletin MS04-026.


Disable Outlook Web Access

Until a patch can be applied, you may wish to disable Outlook Web Access for each affected Exchange site. You can do this by performing the following steps:

    1. Start Exchange Administrator.
    2. Expand the Configuration container for the site.
    3. Click the Protocols container for the site.
    4. Open the properties of the HTTP (Web) Site Settings object.
    5. Click to clear the Enable Protocol check box.
    6. Wait for the change to replicate, and then verify that this change has replicated to each server in the site. To do this, bind to each server in the site with Exchange Administrator, and then view the setting.

    Vendor Information

    948750
     

    Microsoft Corporation Affected

    Updated:  August 10, 2004

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    Please refer to Microsoft Security Bulletin MS04-026.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.


    CVSS Metrics

    Group Score Vector
    Base
    Temporal
    Environmental

    References

    Acknowledgements

    This vulnerability was reported by Microsoft.

    This document was written by Damon Morda based on information provided by Microsoft.

    Other Information

    CVE IDs: CVE-2004-0203
    Severity Metric: 2.43
    Date Public: 2004-08-10
    Date First Published: 2004-08-11
    Date Last Updated: 2004-08-11 12:57 UTC
    Document Revision: 26

    Sponsored by CISA.