Re: Cross-Site Scripting vulnerabilities in Mozilla, Internet Explorer, Opera and Chrome

2009-07-06 Thread Liu Die Yu
At first glance there it missed vbscript:?

On Sat, Jul 4, 2009 at 1:07 AM, Michal Zalewskilcam...@coredump.cx wrote:
 refresh: 0; URL=javascript:alert(document.cookie)
 The code will work in context of this site.

 ...which happens to be covered here for half a year or so:
 http://code.google.com/p/browsersec/wiki/Part2#Redirection_restrictions

 I can't see how this could be a vulnerability per se, although
 changing the behavior offers an additional, if small, degree of
 protection in case of security lapses in web applications, so it's a
 reasonable improvement.

 Cheers,
 /mz



Google Chrome Break

2008-11-11 Thread Liu Die Yu

Address spoofing. Already patched. It's in the news last month.

Just a reminder, XCON'08 is coming in a week - check http://xcon.xfocus.org/

greetz to drewcopley, drorshalev, zwell, liuyuer, lqa21, and, of course 
[EMAIL PROTECTED]


--

http://liudieyu.com/kissofthedragon.32168816196486005/

To be viewed with Google Chrome

Last tested
Wednesday, October 29, 2008 at 9:53:18 AM (time zone: UTC/GMT +8 hours)
Up-to-date Google Chrome (version: 0.2.149.30)

Contents
Address spoofing.
1. Address is displayed bbb.org.
2. Contents are not from bbb.org(contents are manipulated).

http://twitter.com/liudieyu

Google Chrome is still virgin - Right now only had a bunch of D.o.S, 
and, a buffer overrun if user saves the attacker's webpage.





Firefox Privacy Broken If Used to Open Web Page File

2008-10-07 Thread Liu Die Yu

Brief from my Twitter:

 The effect is exposing any location, incl your browsing 
history(about:cache etc)   04:54 AM October 05, 2008  from web
   
Workaround: Do not use Firefox to open HTM/HTML - not from RAR package, 
not from remote Windows share folder, not from local, etc. 04:36 AM 
October 05, 2008 from web


Some details from my blog:

* Also works on Firefox 3.0.3
* Also works on Firefox 3.0.2

...

For Firefox, location is wrong when dot URL shortcut is launched by HTML 
elements. Slightly variant from CVE-2008-2810 which is about command 
line and only fixed in that perspective.


...

__
Complete details and demo are available at 
http://liudieyu0.blog124.fc2.com/blog-entry-6.html




MSIE:patchedundisclosed XSS vuln

2003-07-12 Thread Liu Die Yu


MSIE:patchedundisclosed XSS vuln
(that's all is end of file if you are in a hurry)

[tested]
OS:Windows XP Professional
Browser: MS Internet Explorer 6.0.2600..xpclient.01087-1148
(without any patch)
(note: it doesn't work on the patched MSIE) 


[demo]
at
http://www.safecenter.net/liudieyu/AutoScanJPU/AutoScanJPU-MyPage.htm
or
http://umbrella.mx.tc == AutoScanJPU-MyPage section


[exp]
window.external.AutoScan method can navigate other windows to somewhere, 
and it doesn't filter Javascript-protocol url.


that's all.

[how]
http://www.safecenter.net/CrossZone/ie/UJPU.HTM


[gossiping]


does anyone here know other vulnz patched silently? 



greetings to:
the Pull, dror, guninski and Vadim Krochak - and gean!

 

best wishes 

die



make notes easily! 
- http://www.safecenter.net/liudieyu/domex
- http://domex.int.tc
---
all mentioned resources can be found at http://umbrella.mx.tc


(MSIE)A rather old trick for web server is now played on MSIE.

2002-12-26 Thread Liu Die Yu


(MSIE)A rather old trick for web server is now played on MSIE.
(that's all is the end of file if you are in a hurry)

[tested]MSIEv6(CN version)
Patch: Q312461,Q328970(MS02-066)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 


[demo]
at 
http://www16.brinkster.com/liudieyu/viaSWFurl/viaSWFurl-MyPage.htm
or 
clik.to/liudieyu == viaSWFurl-MyPage section.
or
[code.url start]
http://www.macromedia.com//shockwave/download/triggerpages_mmcom/flash.swf?
lt;SCRIPTgt;alert(document.cookie)lt;/SCRIPTgt;
[code.url end]



[exp]
MSIE generates a page to load a multimedia file instead of loading it 
directly. 
the automatically generated page for loading an SWF(the extension of a 
flash file) file contains URL of the SWF file -- without any encoding.

so the oldest XSS trick works on MSIE.

that's all.

[how]
(real show)

first, realize MS programmers are lazy(= too busy) and they prefer to 
look wise, so you can doubt that they generate a page to load a multimedia 
file.
then, check it: i played a small trick: typing 
javascript:alert(document.body.innerHTML)
in the address field when the content of MSIE is a JPG file.
soon after confirmation, try the trick and you'll find it doesn't work on 
a JPG file because the URL is encoded properly.(that programmer must have 
been fired for his defence)
now you may lose self-confidence -- MS is not that foolish. 
but thinking about document.open hole(not flaw) will encourage you.
(the essential point!)
then after several tries, you have this document.

(very few steps)

[more?]
this trick may work on other browsers, but i can't test it at present.

[BTW]
(0)merry Christmas!
(1)Greetings to the Pull
(2)there are many demoz at http://www.safecenter.net (thanx to Dror 
Shalev for making them)
(3)i'm busy with exams, hope you can understand and forgive my delay (the 
school is really crazy). i'll have a 30-day holiday. i think it's enough 
to make a site showing tricks i know, why they work,how to exploit them, 
and how people got the ideas. it's crosszone.org(not ready yet)
(4)LOTUS: i am slow.

[contact]
clik.to/liudieyu == How to contact Liu Die Yu section
(any postcard? :-) )




XSS flaw found at https://www.e-gold.com

2002-12-12 Thread Liu Die Yu


i know bugtraq doesn't accept vulnerability on one site, but the following 
info is important; please suggest a forum for me to post.


===--



XSSatEGOLD-Content-Tech

XSS flaw found at https://www.e-gold.com;

technically, it's nothing new. 

XSS at E-gold is very dangerous. E-gold is one of the most popular way to 
do international business. and unlike credit card system, e-gold sent, it 
never comes back. there is no refund policy. 

so stealing passphrase means stealing real gold. 

it's important, so i take it seriously.


[tested]
browser:MSIEv6 
time:2002/12/10 UTC+800


[demo]
at
http://www16.brinkster.com/liudieyu/XSSatEGOLD/XSSatEGOLD-MyPage.htm
or
http://clik.to/liudieyu ==XSSatEGOLD
or
[CODE.URL START]
https://www.e-gold.com/acct/historycsv.asp?
initial=1lt;SCRIPTgt;s=You_can_NOT_trust_this_page_if_you_got_if_from_a_
link.by_LiuDieYu_http://clik.to/liudieyu;w=window.open(https://www.e-
gold.com/acct/login.html);setTimeout(w.document.write
(s),150);lt;/SCRIPTgt;startmonth=12startday=4startyear=1996endmonth=12end
day=4endyear=2003paymentsreceived=1oldsort=tstamppage=1
[CODE.URL END]

[exp]

technically, there is only one thing important for XSS attackers:
some CGI can only be found when you are logged in, but they can be reached 
even if you are not logged in.
of course, the module dealing with logged-in users is different from the 
one dealing with un-logged-in users.
so, you have to test in both situations to ensure it's not XSS vulnerable.


[contact]
http://clik.to/liudieyu == how to contact liu die yu section

[BTW]
this flaw can be found easily with FASX at
http://clik.to/fasx



Poisonous Style for Dialog window turns the zone off.

2002-12-03 Thread Liu Die Yu


Poisonous Style for Dialog window turns the zone off.
(that's all is the end of file if you are in a hurry)

[tested]
MSIEv6(CN version)
Patch: Q312461,Q328790(MS02-066)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 

[demo]
at 
http://www16.brinkster.com/liudieyu/PoisonousSTYLEforDialog/PoisonousSTYLEf
orDialog-MyPage.htm
or 
clik.to/liudieyu == PoisonousSTYLEforDialog-MyPage section.

[exp]
you can appoint the style of text in window(a ModalDialog window) opened 
by showModalDialog() regardless of zone difference.

the style can cause execution of script, one example:
IMG width=0 height=0 style=width: expression(alert());

so poisonous style can do XSS at client side.

that's all


[how]
i spent some time trying to bypass hotmail script filtering, so i read 
something about it, including the above one from Guninski.
so, i got this one as soon as i read the description of showModalDialog
() at MSDN.

[BTW]
if you are interested in XSS at server side, don't miss a tool at 
http://clik.to/fasx





(MSIE) when parent gives his son bad things ;) --dialogArguments again

2002-11-19 Thread Liu Die Yu


IFRAME in a page opened by openModalDialog has  dialogArguments of its 
parent.

[tested]MSIEv6(CN version)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 

[demo]
at 
http://www16.brinkster.com/liudieyu/BadParent/BadParent-MyPage.htm
or 
clik.to/liudieyu == BadParent-MyPage section.

/*note: please tell me if MSIE SP1 allows an internet page contains an 
iframe with local content*/


[exp]
IFRAME in a page opened by openModalDialog has  dialogArguments of its 
parent. so Attacker can open (via openModalDialog) his page  which 
contains an iframe whose content is in the victim zone and 
uses dialogArguments directly without filtering.

in the demo:
(*)victim zone is localzone;
(*)the page from victim zone is res://shdoclc.dll/privacypolicy.dlg; it 
uses cookieUrl without filtering.

[how]
realize that IFRAME has some properties the same  as those of its parent. 
but the parent can be bad. 

(BTW, i used to hate that my parents give me many bad things, now i 
realize it's my job to resist bad things. ;) )

[contact]
clik.to/liudieyu == How to contact Liu Die Yu section



MSIE:SaveRef cracks (VictimWindow).document.write

2002-10-21 Thread Liu Die Yu


[title]MSIE:SaveRef cracks (VictimWindow).document.write

[digest]
MSIE: you can always call (VictimWindow).document.write regardless its 
zone if you have its reference.
(please read [more?] section; i think it's important.)

[tested]MSIEv6(CN version)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 
Win98

[demo]
at 
http://www16.brinkster.com/liudieyu/SaveRef_DocumentWrite/SaveRef_DocumentW
rite-MyPage.htm
or 
clik.to/liudieyu == SaveRef_DocumentWrite-MyPage section.

[exp]
save the reference of (NewWindow).document.write when the zone 
of (NewWindow) is yours. then you can call it via reference even if its 
zone is not yours.

simple, that's all.

[more?]
i've read some doc about COM(Component Object Modal) at MSDN.
MSDN says
The server is primarily responsible for security—that is, for the most 
part, the server determines whether it will provide a pointer to one of 
its objects to a client
(at http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/com/comext_99df.asp)
this causes Georgi Guninski 's (victimWindow).document SaveRef flaw. i 
guess the patch just plants a security checker in window.document . 

but method-SaveRef is not that easy to patch since there are so many 
methods in so many objects in so many APPLICATIONS(not only MSIE).
SaveRef may end up turning M$ off? ;)

i don't know. please tell me your opinion via email.
(my physical work is all over,so reply in 24 hours)

[contact]
[EMAIL PROTECTED]
or
clik.to/liudieyu === how to contact liu die yu section



MSIE:SaveRef turns Zone off

2002-10-01 Thread Liu Die Yu



TITLEMSIE:SaveRef turns Zone off/TITLE

[digest]
MSIE: you can execute jscript in any zone by saving the reference 
of (NewWindow).location.assign.
(content after the [exp] section is not directly related to the flaw, so 
skip it if you are in a  hurry;)

[tested]MSIEv6(CN version)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 
Win98

[demo]
at 
http://www16.brinkster.com/liudieyu/SaveRef/SaveRef-MyPage.htm
or 
clik.to/liudieyu == SaveRef-MyPage section.

[exp]
javascript-protocol URL can cause CSS at client side, so microsoft 
blocked (NewWindow).location.assign method(there is no other explanation 
at all). but we can save the reference(mostly the same as 'pointer' in C) 
of (NewWindow).location.assign when we can access it, then we can access 
it forever -- regardless of NewWindow's zone, which means we can execute 
jscript in any zone.

simple, that's all.

[BTW]
thanx to :
0. all knowledge bases
1.dror shalev, without his Who Framed IE demo at
http://drorshalev.brinkster.net/dev/Search 
and his words, i wouldn't have discovered this flaw.(both SaveRef  Who 
Framed IE hurt microsoft's heart -- OOP/COM/DCOM ;)
2.the Pull, his words at
http://home.austin.rr.com/wiredgoddess/thepull/UnorthodoxBugFinding.txt
are inspiringpractical.

[apology]
i am always late for online issues because of everything around me( one 
example is my parents),  but i've never been absent;)

[contact]
[EMAIL PROTECTED]
or
clik.to/liudieyu === how to contact liu die yu section



MSIEv6 % encoding causes a problem again

2002-09-03 Thread Liu Die Yu



it's about cross-site scripting at MSIEv6 client side using % encoding, 
but not the same as the one by PeaceFire.org which doesn't work on my PC.

[tested]MSIEv6(CN version)
{IEXPLORE.EXE file version: 6.0.2600.}
{MSHTML.DLL file version: 6.00.2600.} 

[demo]
at 
http://www16.brinkster.com/liudieyu/2FforMSIE/2FforMSIE-MyPage.htm
or 
clik.to/liudieyu == 2FforMSIE-MyPage section.

[exp]
%?? in URL is decoded when IE caculates the domain, but not decoded while 
downloading a page.
so
[CODE.URL]http:[EMAIL PROTECTED]/liudieyu
(   2F=hex$(asc('/'))   )
leads to clik.to/liudieyu instead of www.yahoo.com, and the domain of it 
www.yahoo.com for IE

Very simple, that's all.

[contact]
[EMAIL PROTECTED]