Heard of flash m8?

2013/8/22 <xn...@xnite.org>

> **
>
> That's a nice trick and all, but I don't see how it's valuable. In order
> to trigger the XSS you need to modify your browser headers, therefore any
> victim who you are trying to get to a page to execute your XSS would need
> to also modify THEIR browser headers. I don't see how this is any thing
> more than a neat trick. Sorry.
>
>
> On Thursday 22 August 2013 23:18:03 Glenn Grant wrote:
>
> Details below of an XSS vulnerability I discovered in Cloudflare (markdown
> format)
>
>
> - Glenn | /dev/alias
>
> * http://blog.devalias.net
>
> * http://devalias.net
>
>
> -----
>
>
> **Reference Number:** DAHAX-2013-001 (/dev/alias/hacks 2013-001)
>
>
> **Notification Timeline:**
>
>
> * 10/07/2013, Request# 38713 (
> https://support.cloudflare.com/anonymous_requests/new)
>
> * 10/07/2013, Vendor looking into issue
>
> * 16/07/2013, Updated vendor with new details (Length: 101 instead of 72)
>
> * 16/07/2013, Vendor requested that I test again
>
> * [No further response from vendor]
>
> * 01/08/2013, Tested again, vulnerability fixed
>
>
> **Details Published:** 14/08/2013 (
> http://blog.devalias.net/post/58217238426/dahax-2013-001-cloudflare-xss-vulnerability
> )
>
>
> ## What?
>
>
> * Reflected XSS (cross site scripting) attack
>
>
> ## Where's Affected?
>
>
> * Theoretically it seems that any page that uses cloudflare will be
> affected.
>
>   - Eg: http://www.cloudflare.com/
>
>
> ## How?
>
>
> * **To bring up the vulnerable page**
>
>   - Set your X-Forwarded-For header to <del>72+</del> 101+ characters
>
>     - <del>Eg: X-Forwarded-For:
> AAAAAAAAAABBBBBBBBBBCCCCCCCCCCDDDDDDDDDDEEEEEEEEEEFFFFFFFFFFGGGGGGGGGGHH</del>
>
>     - Eg: <pre>X-Forwarded-For:
> AAAAAAAAAABBBBBBBBBBCCCCCCCCCCDDDDDDDDDDEEEEEEEEEEFFFFFFFFFFGGGGGGGGGGHHHHHHHHHHIIIIIIIIIIJJJJJJJJJJK</pre>
>
>   - Load a site using cloudflare
>
>   - You should end up on "DNS Points to Prohibited IP" page
>
>
> * **To trigger the XSS**
>
>   - Set your User-Agent string to the XSS attack
>
>     - Eg: <pre>User-Agent: USER-AGENT being tested for
> XSS..<script>alert('Vulnerable to XSS via USER-AGENT header [Found by
> devalias.net]')</script></pre>
>
>
> * **The whole attack**
>
>   - Ensure your X-Forwarded-For and User-Agent headers are configured as
> above
>
>   - Navigate to a page using cloudflare
>
>   - ???
>
>   - Profit!
>
>
> ## Who?
>
>
> * Discovered by [Glenn '/dev/alias' Grant](http://www.devalias.net/) (
> gl...@devalias.net)
>
>
> ## Responsible Disclosure Notice
>
>
> * Following in the footsteps of Google's vulnerability disclosure
> timeline, unless otherwise agreed to beforehand, I reserve the right to
> publicly announce the details of any discovered vulnerabilities 7 days post
> notification.
>
>   * **Google's Rationale:** "Seven days is an aggressive timeline and may
> be too short for some vendors to update their products, but it should be
> enough time to publish advice about possible mitigations, such as
> temporarily disabling a service, restricting access, or contacting the
> vendor for more information. As a result, after 7 days have elapsed without
> a patch or advisory, we will support researchers making details available
> so that users can take steps to protect themselves. By holding ourselves to
> the same standard, we hope to improve both the state of web security and
> the coordination of vulnerability management." - [Google](
> http://googleonlinesecurity.blogspot.com.au/2013/05/disclosure-timeline-for-vulnerabilities.html
> )
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to