The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Mozilla FTP View Cross-Site Scripting Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 6 Aug 2002 09:08:20 +0900
From: Eiji James Yoshida <[email protected]>
To: [email protected]
Subject: Mozilla FTP View Cross-Site Scripting Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+ Title:
~~~~~~~~~~~~~~~~~
Mozilla FTP View Cross-Site Scripting Vulnerability

 
+ Date:
~~~~~~~~~~~~~~~~~
4 August 2002

 
+ Author:
~~~~~~~~~~~~~~~~~
Eiji James Yoshida [[email protected]]

 
+ Risk:
~~~~~~~~~~~~~~~~~
Medium

 
+ Vulnerable:
~~~~~~~~~~~~~~~~~
Windows2000 SP2 Mozilla 1.0

 
+ Not vulnerable:
~~~~~~~~~~~~~~~~~
Windows2000 SP2 Mozilla 1.1 Beta

 
+ Overview:
~~~~~~~~~~~~~~~~~
Mozilla allows running Malicious Scripts due to a bug in 'FTP view'.
If you click on a malicious link, the script embedded in URL will run.

* If the ftp server and the http server are the same address, it is dangerous.
  Because the cookie may be modified by the attacker.

 
+ Detailes:
~~~~~~~~~~~~~~~~~
This problem is in 'FTP view'.
The '<title>URL</title>' is not escaped.

 
+ Exploit code:
~~~~~~~~~~~~~~~~~
<a href="ftp://&#091;FTPserver]/#%3C%2ftitle%3E%3Cscript%3Ealert(%22exploit%22);%3C%2fscript%3E">Exploit</a>

Example:
<a href="ftp://ftp.mozilla.org/#%3C%2ftitle%3E%3Cscript%3Ealert(%22exploit%22);%3C%2fscript%3E">Exploit</a>

 
+ Demonstration:
~~~~~~~~~~~~~~~~~
http://www.geocities.co.jp/SiliconValley/1667/advisory03e.html

 
+ Workaround:
~~~~~~~~~~~~~~~~~
Use the latest version of Mozilla 1.1 Beta or disable JavaScript.

 
+ Vendor status:
~~~~~~~~~~~~~~~~~
The Mozilla security bug group was notified on 22 June 2002.
They have fixed the problem, and the fix will be included in Mozilla 1.0.1.
(The fix has already been included in the latest version of Mozilla 1.1 Beta.)
 

- -------------------------------------------------------------
Eiji "James" Yoshida
penetration technique research site
E-mail: [email protected]
URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
- -------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8ckt
Comment: Eiji James Yoshida

iQA/AwUBPUyPYTnqpMRtMot1EQKufACg1lz0PRFDXcb98rNGdrB+Jj+Y5B8AoILi
ks0Jo30ucn62VTWbRKeW22WO
=oarq
-----END PGP SIGNATURE-----



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру