[Full-Disclosure] BadBlue 302 Status Message XSS

From: Matthew Murphy (mattmurphyat_private)
Date: Fri Jul 19 2002 - 17:38:23 PDT

  • Next message: Matthew Murphy: "[Full-Disclosure] Outlook Express Attachment Property Spoofing Vulnerabilities"

    BadBlue 1.74 (presumably earlier) is susceptible to a cross-site
    scripting attack.  When BadBlue is passed a name of a non-existant
    file path (or an existant folder) that does not end in a 0x2f character
    ("/") it returns a 302 status code containing some text:
    
    HTTP/1.0 302 found
    Location: /<SCRIPT>/
    
    <html><body><pre>GET /<SCRIPT> HTTP/1.0
    
    Obviously, if you pass in HTML markup, it continues on into the
    reply un-filtered, resulting in a cross-site scripting attack.
    
    This vulnerability cannot be exploited on Internet Explorer, or
    any browser which ignores entities in HTTP redirect messages.
    
    Successful exploitation may require a significant amount of
    "garbage" HTML, as the entity is downloaded, displayed, and
    then the redirect executed.
    
    This vulnerability poses minimal risk, but should be taken very
    seriously.
    
    "The reason the mainstream is thought
    of as a stream is because it is
    so shallow."
                         - Author Unknown
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Full-Disclosureat_private
    http://lists.netsys.com/mailman/listinfo/full-disclosure
    



    This archive was generated by hypermail 2b30 : Fri Jul 19 2002 - 17:48:45 PDT