[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Self-contained XSS Attacks (the new generation of XSS)



<html><div style='background-color:'><P><BR>Hi Tim,</P>
<P>&nbsp;&nbsp; You make a great point. &nbsp;</P><BR><BR><BR>
<DIV>
<P><FONT size=1>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;Ron Jennings, 
&nbsp;NCIE SSP&nbsp;</FONT></P>
<P><FONT color=#003399>&nbsp;&nbsp;&nbsp;<FONT size=2>Chaser Security- A Microsoft 
Partner</FONT></FONT></P>
<P><FONT color=#003399 size=2>&nbsp; Cell:559.360.2340 24hr.customer 
service</FONT></P>
<P><FONT color=#003399 size=2>&nbsp; VOIP:562.365.1295 </FONT></P></DIV>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #a0c6e5 2px solid; MARGIN-RIGHT: 
0px"><FONT style="FONT-SIZE: 11px; FONT-FAMILY: tahoma,sans-serif">
<HR color=#a0c6e5 SIZE=1>
From: <I>Tim &lt;tim-security@xxxxxxxxxxxxxxxxxxx&gt;</I><BR>To: <I>"pdp (architect)" &lt;pdp.gnucitizen@xxxxxxxxxxxxxx&gt;</I><BR>CC: <I>full-disclosure@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx,webappsec@xxxxxxxxxxxxxxxxx, websecurity@xxxxxxxxxxxxx</I><BR>Subject: <I>Re: [Full-disclosure] Self-contained XSS Attacks (the new generation of XSS)</I><BR>Date: <I>Fri, 22 Sep 2006 10:03:11 -0400</I><BR>&gt;<BR>&gt;Hello pdp,<BR>&gt;<BR>&gt; &gt; http://www.gnucitizen.org/blog/self-contained-xss-attacks<BR>&gt; &gt;<BR>&gt; &gt; XSS attacks can be persistent and non-persistent. Persistent XSS is<BR>&gt; &gt; more dangerous since it allow attackers to control exploited clients<BR>&gt; &gt; for longer. On the other hand non-persistent XSS is considered less<BR>&gt; &gt; dangerous although it has been widely used in many phishing attempts.<BR>&gt; &gt;<BR>&gt; &gt; In this article I will expose some of my findings around a new attack<BR>&gt; &gt; vector which is of type non-persistent XSS but a lot more dangerous<BR>&gt; &gt; than the persistent one.<BR>&gt; &gt;<BR>&gt; &gt; Some of you might be familiar with this attack vector; this subject<BR>&gt; &gt; has been covered very vaguely in the past and none of its full<BR>&gt; &gt; potentials has been explored. The impact of this attack is much bigger<BR>&gt; &gt; today and could affect many web applications.<BR>&gt;<BR>&gt;This is a very interesting vector. However, I would argue that it is<BR>&gt;not a new class of XSS. Generally, the classes have been defined based<BR>&gt;on where the injected data flows from, not how it is injected in the<BR>&gt;page.<BR>&gt;<BR>&gt;For instance, stored or persistent XSS comes from an attacker via one<BR>&gt;communication, gets saved on the server, and is later reproduced to<BR>&gt;another user. Reflected is generally embedded in a link, sent to a<BR>&gt;victim, which a victim then sends to the webserver and is reflected back<BR>&gt;to achieve injection. DOM-based is similar, but does not need to flow<BR>&gt;to the webserver before coming back to get injected. I personally label<BR>&gt;these three classes Type 2, Type 1 and Type 0 respectively, in order to<BR>&gt;reduce confusion about terminology [1].<BR>&gt;<BR>&gt;All three of these scenarios could be used with your injection vector.<BR>&gt;A server side script could store the URL supplied by an attacker, and<BR>&gt;later present it to a victim, thus making it persistent. Similarly, a<BR>&gt;document.write() call could be exploited to inject a data: link, even if<BR>&gt;the typical dangerous characters (', ", &lt;, &gt;, etc) were handled.<BR>&gt;<BR>&gt;Don't get me wrong... I really like the vector, and what you've brought<BR>&gt;to the list. I just don't think it should be considered another class.<BR>&gt;<BR>&gt;cheers,<BR>&gt;tim<BR>&gt;<BR>&gt;<BR>&gt;1. http://en.wikipedia.org/wiki/XSS<BR>&gt;<BR>&gt;-------------------------------------------------------------------------<BR>&gt;Sponsored by: Watchfire<BR>&gt;<BR>&gt;Cross-Site Scripting (XSS) is one of the most common application-level<BR>&gt;attacks that hackers use to sneak into web applications today. This<BR>&gt;whitepaper will discuss how traditional CSS attacks are performed, how to<BR>&gt;secure your site against these attacks and check if your site is protected.<BR>&gt;Cross-Site Scripting Explained - Download this whitepaper today!<BR>&gt;<BR>&gt;https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008Vmr<BR>&gt;--------------------------------------------------------------------------<BR>&gt;<BR></FONT></BLOCKQUOTE></div></html>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/