exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

adobe-cdpfr.txt

adobe-cdpfr.txt
Posted Nov 10, 2007
Authored by Antonio Parata | Site ictsc.it

Canonicalization issues in Adobe Macromedia Flash Player version 9.0 r31 allow for the manipulation of the cross domain policy file source.

tags | advisory
SHA-256 | 87de7baafc1ba6b87ba85639942cf7f8fa75ef6b7d153a6b96995dfb7d594a4a

adobe-cdpfr.txt

Change Mirror Download
=========================================================================
Canonicalization issues in Flash Cross-domain policy file request
=========================================================================

Vendor: Adobe (http://www.adobe.com)
Software Affected: Macromedia Flash Player
Software Version: Flash 9.0 r31

Impact (CVSSv2 score): medium (6.4/10, vector:
AV:N/AC:L/Au:N/C:N/I:P/A:P)

Discovered by: Antonio "s4tan" Parata

Discovery Date: 2007-05-18
Release Date: 2007-11-09
Last Update: 2007-11-09


1. Summary
==========

>From the adobe web site: "A policy file is a simple XML file that gives
the Flash Player permission to access data from a given domain without
displaying a security dialog. When placed on a server, it tells the
Flash Player to allow direct access to data on that server, without
prompting the user grant access".

It is possible to alterate the url of the request which gets the
cross-domain policy file.


2. Vulnerability Analysis
=========================

2.1 Overview
------------

The policy file is usually placed in the document root of the web server
with the name crossdomain.xml, unless a different path is specified.

When a request to an external url is made, first of all flash requests
the content of the policy file at the external domain, and then (if the
policy permits it) the user request is made.

By adding some special chars in the url it is possible to modify the
path of the url request of the policy file.

Consider the following simple .mxmlc file:

<?xml version="1.0" encoding="utf-8"?>
<mx:Application xmlns:mx="http://www.adobe.com/2006/mxml" layout="absolute">

<mx:HTTPService id="request" useProxy="false"></mx:HTTPService>
<mx:TextInput id="src" x="251" y="174"/>
<mx:Button label="Send!" x="430" y="174" id="sendButton"
click="clickSendButton(event)"/>

<mx:Script>
<![CDATA[

import flash.events.MouseEvent;

private function clickSendButton(event:MouseEvent):void {

request.url = src.text;
request.send();
}

]]>
</mx:Script>

</mx:Application>

You can compile it with mxmlc.

If you enter in the text area the url
http://www.somesite.com/some/path/index.php,
before the request is done Flash makes a request to /crossdomain.xml to
retrieve the cross-domain policy file. If the policy permits the
request, another request to /some/path/index.php is made.

2.2 Attack example
------------------

On Firefox (v 2.0.0.3) if you insert the following url
http://www.somesite.com?http=,
the request to the policy file will be:

GET /?http=/crossdomain.xml HTTP/1.1

so instead of the policy file you retrieve the html of the homepage.
If you insert the url http://www.somesite.com?aaa=bbb&ccc=ddd#, the
request to the policy file will be:

GET /?aa=bbb&cc=ddd HTTP/1.1

On Internet Explorer 7, we have a lot more fun. Internet Explorer
automaticaly converts \ to /.

So if we insert the following url
http://www.somesite.it\path/to/wathever/index.php?param=value&cross=,
the request to the policy file will be:

GET /path/crossdomain.xml HTTP/1.1

Then if we insert as url the following
http://www.somesite.it\path\to\wathever\index.php?aaa=bbb&ccc=, the
request to the policy file will be:

GET /path/to/wathever/index.php?aaa=bbb&ccc=/crossdomain.xml HTTP/1.1

We can arbitrarily modify the path of the request for the cross-domain
policy file.

Not only the HTTPService object is vulnerable, but also the WebService
object (as an example try the url http://www.somesite.it?wsdl=WSDL).
It is not excluded that other functions that make remote requests are
vulnerable.

2.3 What a malicious attacker can do
------------------------------------

Modifying the path of the request an attacker can perform GET requests
to an arbitrary file on the web server (he can for example exploit a
CSRF vulnerability on a third web site).


3. Acknowledgments
==================

I would like to acknowledge Alberto "icesurfer" Revelli and Stefano "wisec"
Di Paola for helping me in writing the advisory.


4. Contact
==========

Antonio "s4tan" Parata - 2007
web site: http://www.ictsc.it
mail: s4tan@ictsc.it, s4tan@ush.it


5. Disclaimer
=============

Copyright (c) 2007 Antonio Parata

The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.

6. Revision History
===================

2007-11-09: Initial release

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close