exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ProCheckUp Security Advisory 2007.38

ProCheckUp Security Advisory 2007.38
Posted Jan 22, 2008
Authored by ProCheckUp, Jan Fry | Site procheckup.com

sIFR version 2.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2d82c6c1796407730517480445f8bd86e0c4e14f0657b9b35cf1ca6c4d13e9a7

ProCheckUp Security Advisory 2007.38

Change Mirror Download
PR07-38: XSS on sIFR

Vulnerability Found: 12 November 2007

Vendor contacted: 19 November 2007

Vulnerability fixed: The issue remains unfixed. The developer of sIFR
was contacted several times but did not respond.

Severity: Medium

Successfully tested on: sIFR 2.0.2

Description:

Sites using sIFR to render fonts/text are vulnerable to a vanilla XSS
within the "txt" parameter processed by the actionscript in the
'<fontname>.swf' flash file.

Note: the victim user does NOT need to be authenticated for this
vulnerability to be exploitable.


HTML injection PoC:

Provided the victim is tricked to load the following URL, he/she would
be redirected to a third-party site.

https://target.tld/<fontname>.swf?txt=<a
href="http://www.procheckup.com">click me!</a>

XSS PoC:

http://target.tld/fonts/FuturaLt.swf?txt=%3Ca%20href=%22javascript:alert(document.cookie)%22%3Eclick%20me!%3C/a%3E&textalign=left&offsetTop=-2&textcolor=


Consequences:

An attacker may be able to cause execution of malicious scripting code
in the browser of a user who clicks on a link to the target website, or
visits a malicious website that requests such link.

This type of attack can result in non-persistent defacement of the
target site, or the redirection of confidential information (i.e.:
session IDs) to unauthorised third parties.


References:

http://www.procheckup.com/Vulnerabilities.php

http://www.mikeindustries.com/sifr


Credits: Jan Fry of ProCheckUp Ltd (www.procheckup.com)


Legal:

Copyright 2008 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the
Internet community for the purpose of alerting them to problems, if and
only if, the Bulletin is not edited or changed in any way, is attributed
to Procheckup, and provided such reproduction and/or distribution is
performed for non-commercial purposes. Any other use of this information
is prohibited. Procheckup is not liable for any misuse of this
information by any third party.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close