exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Computer Academic Underground Advisory 2008.2

Computer Academic Underground Advisory 2008.2
Posted Apr 9, 2008
Authored by Computer Academic Underground, OneIdBeagl3 | Site caughq.org

A stored cross site scripting vulnerability exists in Microsoft Windows SharePoint Services 2.0 where a malicious user can bypass sanitization and inject javascript into a web page they are editing.

tags | exploit, web, javascript, xss
systems | windows
SHA-256 | de54a6cb63b016abf59cab3f7964511738229fd8484eb8c2dfc2ed77e80b45ce

Computer Academic Underground Advisory 2008.2

Change Mirror Download
                      ____      ____     __    __
/ \ / \ | | | |
----====####/ /\__\##/ /\ \##| |##| |####====----
| | | |__| | | | | |
| | ___ | __ | | | | |
------======######\ \/ /#| |##| |#| |##| |######======------
\____/ |__| |__| \______/

Computer Academic Underground
http://www.caughq.org
Security Advisory

===============/========================================================
Advisory ID: CAU-2008-0002
Release Date: 04/08/2008
Title: Microsoft Windows SharePoint Services Picture Source XSS
Application/OS: Microsoft Windows SharePoint Services 2.0
Topic: A stored Cross Site Scripting (XSS) attack is possible
in Microsoft SharePoint Services 2.0 via picture object
source when adding a picture object to a page.
Vendor Status: Not Notified
Attributes: XSS, Web Service, Microsoft Tuesday
Advisory URL: http://www.caughq.org/advisories/CAU-2008-0002.txt
Author/Email: OneIdBeagl3 <oneidbeagl3 (at) caughq.org>
===============/========================================================

Overview
========

A stored XSS vulnerability exists in Microsoft Windows SharePoint
Services 2.0 where a malicious user can bypass sanitization and inject
javascript into a web page they are editing. Under normal circumstances,
SharePoint does not permit users to include javascript in any submitted
content.


Impact
======

If javascript is enabled in a user's browser, when the user views the
page, the javascript will be executed. As a result, an attacker could
potentially steal credentials and takeover the browser or machine of any
user who views the page.


Affected Systems
================

Microsoft Windows Share Point Services 2.0


Technical Explanation
=====================

The string below is not properly sanitized when the web page is saved
after adding a picture using the application's text editor:

"""></P></div></td><script>alert("bingo");</script>

The text between the script tags will be injected into the page upon
each successful edit and save operation, after the page is initially
saved. On initial testing, there did not appear to be a size limit for
javascript text that could be injected. The string must also use all
double quotes when quotes are needed.


Solution & Recommendations
==========================

Unless editing web pages in SharePoint 2.0 is necessary, disable this
feature. If the feature is necessary, ensure users must authenticate to
a service before giving them the privilege to create or edit pages, and
only afford users the privileges if they need to create or edit pages.
This practice will help leave an audit trail to determine which account
was used to create a malicious web page if an incident takes place.


Exploitation
============

===============/========================================================
Steps to inject the javascript attack:

1) Log-in as a user that has enough privileges to create a web page.

2) In the web page on the top toolbar click on Create.

3) Under the 'Web Pages' section, click on 'Basic Page.'

4) Pick a web page name and click the create button.

5) In IE 7, an Edit Content Link appears in the upper right hand corner.
Click on it and it should open up a "Rich Text Editor -- Webpage
Dialog" window.

6) Add a picture to the page, and in the 'Picture Source' enter the
following:

"""></P></div></td><script>[your javascript here]</script>

7) Save the content, and then click 'Edit Content' again and save it.
Now the javascript is embedded in the page. Also, each time the page
is edited and saved, the javascript is duplicated in the page.


Credits & Gr33ts
================

CAU & HDM


--
I)ruid, CĀ²ISSP
druid@caughq.org
http://druid.caughq.org
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close