BugTraq
Cantv/Movilnet's Web SMS vulnerability. Mar 27 2006 04:57PM
Bugtraq @ SNSecurity (bugtraq snsecurity com) (1 replies)
Re: Cantv/Movilnet's Web SMS vulnerability. Mar 28 2006 11:10PM
raven (locrideweb libero it)
Bugtraq @ SNSecurity wrote:
>
> Quick Summary:
> ************************************************************************

>
> Product : Movilnet's Web SMS.
> Version : In-production versions.
> Vendor : Movilnet - http://www.movilnet.com.ve/
> Class : Remote
> Criticality : High
> Operating System(s) : N/A.
[snip]
> Proof Of Concept Status
> ************************************************************************

>
> No proof of Concept will be released until the provider has sorted out
> the
> issue.
A first impact Proof of Concept is to use imagemagick tools with gocr to
have a good image.
I've used colors level input: 31 0.11 160 (you can use gimp too to see
the effects) to have a white background and black (or most like black
:P) foreground.
Later i've used gocr with djpeg in pipe (see gocr -h to understand
better) and i've obtained the famous number.
I've already writed a perl software to send sms to cantv mobiles and not
is soo hard to implement this last operations, but not is public this
latest version because i do for myself.

> Credits
> ************************************************************************

>
> This vulnerability was discovered by Ruben Recabarren and Leandro
> Leoncini
> at SNSecurity's Research Lab.
>
Good work, to the advisors. But i think that everyone that have a not so
insane mind can understand the CanTv stupidity of this captcha
implementation.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus