Discover Hacks/Cracks News
Hacker Exposes Unfixed Security Flaws In Pentagon Website
The site, which is run by the Office of the Assistant Secretary of Defense for Public Affairs, is basically a tourist site for the Pentagon and doesn't appear to house any sensitive data. But a security researcher who studied the Ne0h's work says the Pentagon Website could be used to redirect users to a malicious site posing as the Pentagon site.
Daniel Kennedy, partner with Praetorian Security Group, says the session ID appears to be a tracking cookie, and JavaScript can be injected into the page itself to redirect a user to another site, for instance. "Since I can pass that page a reference to an external JavaScript, I can do most anything I can do in JavaScript," says Kennedy, who blogged about the find yesterday. "That includes basic stuff, like crafting a URL to send to users that appears to be from the Pentagon, but actually redirects to 'evil.org,'" for example, he says.
The link for this article located at Dark Reading is no longer available.