Re: Php Nuke POST XSS on steroids

看板Bugtraq作者時間19年前 (2007/03/14 06:07), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串4/4 (看更多)
ascii wrote: > Paul Laudanski wrote: > >> I tried both your scripts at a few locations, and all I get back is this >> > [cut] > > hi Paul, long time from ccc : ) > Hey sure how are you? Been well? I've been really busy with CC. > it happens because http headers must be on a single line, it's a > formatting issue (my fault, i used to put a link to a plain text > version but this time i forgot about it), i've just created a txt > version of the advisory available here: > > http://phpfi.com/214668 > Thank you, this works. > it should be more usable, i dunno when the demos will stop working > on phpnuke.org so i've asked wisec to upload this video since www.ush.it > has bandwidth issues > > http://www.wisec.it/ush/phpnukexss.html > > obviously to bypass the anti-CSRF filter you have to mix the XSS with > the import_request_variables() trick (this doesn't work on phpnuke.org > because they have globals on, this is why i choose that domain) > > consider that import_request_variables() will allows you to do much > more than an XSS, this is just an example advisory on an example product > > I'd be curious to see your POC using the import_request_variables, because at the moment: <br><center><a href="modules.php?name=Downloads"><img src="modules/Downloads/images/down-logo.gif" border="0" alt=""></a><br><br> d4 <form action="modules.php?name=Downloads&amp;d_op=search&amp;query=token<>token " method="post"><font class="content"><input type="text" size="25" name="query"> <input type="submit" value="Search"></font></form> 18 <font class="content">[ I'm not sure how this will have any effect as you must POST the data. In that sense, you can't exactly exploit a web user -- which is what you basically said with a gateway page. In a sense, you are setting up a sort of 'phish' against the site itself. For years we've been seeing to disable register_globals, and your workaround to enable it imvho is not a workaround at all. That shouldn't even be suggested. In closing, can you supply an import_request_variables POC? Thanks as always, Paul Laudanski http://www.linkedin.com/pub/1/49a/17b
文章代碼(AID): #15zo2O00 (Bugtraq)
文章代碼(AID): #15zo2O00 (Bugtraq)