meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, June 19th 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 June 2020

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Outlook Link Re-Write Bug; Cisco Updates; Netgear Bug;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, June 19th, 2020 edition of the Sand Center at Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.2

Jan today discovered an interesting bug in Microsoft Outlook that could potentially make fishing a little bit easier.

0:23.1

The problem here is if you have an image tag within your email, so it's an HTML email,

0:29.1

there's an image tag that's empty, so it's just simple, less than IMG, greater than.

0:34.7

This image tag is inside an A tag with HRF pointing to an untrusted website.

0:42.3

So by itself, that wouldn't really be all that dangerous because this image doesn't really

0:46.3

exist and it's sort of impossible to click on that link. Now the tricky part here is if

0:53.3

this link is followed by another normal link,

0:57.1

then if you forward the email, Outlook will swap the link and will insert the untrusted link

1:05.7

where the trusted link used to be. So the risk here, which isn't huge, but it's there, is that if you forward an email, you

1:15.6

think the email is harmless, the link looked good, you forward the email, but then by forwarding

1:20.8

the email, it's actually being rewritten.

1:23.8

Now, it's not really clear why Outlook does that.

1:27.2

My guess is that I've seen some more issue. Now it's not really clear why Outlook does that.

1:36.0

My guess is that I've seen similar issues with HTML email where the mail reader, in this case Outlook, wanted to make sure that the email you're sending actually is properly

1:42.7

formed.

1:43.9

So this empty image tag is invalid and then Outlook essentially

1:49.4

fixed it for us. This actually sometimes is done to prevent cross-site scripting vulnerabilities

1:55.1

and such because it's really hard to validate the HTML that's not properly formed. So a lot of the libraries

2:02.7

that check for cross-site scripting will first check for invalid HTML, remove it, fix it,

2:10.0

and then validate the email. So it could be an artifact that's sort of caused by this logic.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.