what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rsa-xss.txt

rsa-xss.txt
Posted Mar 17, 2008
Authored by Quentin Berdugo

RSA WebID version 5.3 suffers from a cross site scripting vulnerability. Full details provided.

tags | exploit, xss
SHA-256 | a1edb59a5bf214c71a57242fc57c42d33e01cde190f9b3693bb2d9a034dc05d1

rsa-xss.txt

Change Mirror Download

The following security report has been sent to RSA/EMC on the 2/10/2007 and confirmed by them. RSA took action to alert their customers.

-----------------------------------------



*Description*
The WebID authentication framework suffers from a flow allowing to steal an authenticated users's session if he is enticed into clicking a malicous link.

TEST URL :
https://www.yournamehere.com/WebID/IISWebAgentIF.dll?stage=useridandpasscode&referrer=Z2F&sessionid=0&authntype=2&username=a&passcode=a&postdata=aaa"%20><SCRIPT>alert(document.cookie)</script><!--

*Analysis*
The problem resides in the main library IISWebAgentIF.dll which can usually be found a the address "http://www.server.com/WebID/IISWebAgentIF.dll" this entry point accepts many parameters but only the "postdata" parameter has been found vulnerable.
This parameter is normally sent over a POST method but it is equally accepted through a GET.

This bug has already been reported and confirmed in April 2005 as CVE-2005-118 and a security fix has been issued. Nevertheless, it appears that the fix is poorly implemented as basic circumvention techniques allows to bypass those security checks.

This parameter is matched against the string ""><SCRIPT". It also seems to be matched against the string "javascript:" and probably other keywords. If any of this keywords is matched, the whole value is filtered out from the input.
The problem resides in the fact that creating a exhaustive list of the dangerous keywords is very hard, due to the complexity of the modern scripting codes (HTML, VB, JavaScript etc...).

These examples illustrates how to execute code on the page without triggering the security mechanisms (could be many more) :

[inserting a newline between the tags]
postdata=aaa%22%3E%0A%3CSCRIPT%3Ealert(document.cookie)%3C/script%3E

[insterting a space between the quotation marks and the closing bracket.]
postdata=aaa%22%20%3E%3CSCRIPT%3Ealert(document.cookie)%3C/script%3E

[using the DIV tag to avoid using the keyword "javascript:" (IE only)]
postdata=aaa%22%3E<DIV%20STYLE="width:expression(alert(document.cookie));">

[using VBScript instead of JavaScript (IE only)]
postdata=aaa%22%3E<iframe%20SRC='VBScript:msgbox("XSS")'%20style="visibility:hidden


*Context*
The exploitation of the vulnerability requires an action from the victim (clicking on a malicious link).
As the bug is accessible prior to the authentication phase, it can be discovered and exploited without any access to the underlying application. As the URL denotes the presence of the product, many vulnerable targets can be found easily (ex google "inurl:IISWebAgentIF.dll" ). Finally, it is possible to insert comments at the end of the malicious code to make the victim's page unchanged.


*Affected Software
We have confirmed the existence of this vulnerability in RSA WebID 5.3 + Security Fix XSS ID 45559. It is suspected that any earlier version is also vulnerable.

*Recommandation*
It's safer to filter out dangerous characters instead of dangerous keywords.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close