[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1207706562.3155.178.camel@localhost>
Date: Tue, 08 Apr 2008 21:02:42 -0500
From: "I)ruid" <druid@...ghq.org>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
bugtraq <bugtraq@...urityfocus.com>
Subject: CAU-2008-0002: Microsoft Windows SharePoint
Services Picture Source XSS
____ ____ __ __
/ \ / \ | | | |
----====####/ /\__\##/ /\ \##| |##| |####====----
| | | |__| | | | | |
| | ___ | __ | | | | |
------======######\ \/ /#| |##| |#| |##| |######======------
\____/ |__| |__| \______/
Computer Academic Underground
http://www.caughq.org
Security Advisory
===============/========================================================
Advisory ID: CAU-2008-0002
Release Date: 04/08/2008
Title: Microsoft Windows SharePoint Services Picture Source XSS
Application/OS: Microsoft Windows SharePoint Services 2.0
Topic: A stored Cross Site Scripting (XSS) attack is possible
in Microsoft SharePoint Services 2.0 via picture object
source when adding a picture object to a page.
Vendor Status: Not Notified
Attributes: XSS, Web Service, Microsoft Tuesday
Advisory URL: http://www.caughq.org/advisories/CAU-2008-0002.txt
Author/Email: OneIdBeagl3 <oneidbeagl3 (at) caughq.org>
===============/========================================================
Overview
========
A stored XSS vulnerability exists in Microsoft Windows SharePoint
Services 2.0 where a malicious user can bypass sanitization and inject
javascript into a web page they are editing. Under normal circumstances,
SharePoint does not permit users to include javascript in any submitted
content.
Impact
======
If javascript is enabled in a user's browser, when the user views the
page, the javascript will be executed. As a result, an attacker could
potentially steal credentials and takeover the browser or machine of any
user who views the page.
Affected Systems
================
Microsoft Windows Share Point Services 2.0
Technical Explanation
=====================
The string below is not properly sanitized when the web page is saved
after adding a picture using the application's text editor:
"""></P></div></td><script>alert("bingo");</script>
The text between the script tags will be injected into the page upon
each successful edit and save operation, after the page is initially
saved. On initial testing, there did not appear to be a size limit for
javascript text that could be injected. The string must also use all
double quotes when quotes are needed.
Solution & Recommendations
==========================
Unless editing web pages in SharePoint 2.0 is necessary, disable this
feature. If the feature is necessary, ensure users must authenticate to
a service before giving them the privilege to create or edit pages, and
only afford users the privileges if they need to create or edit pages.
This practice will help leave an audit trail to determine which account
was used to create a malicious web page if an incident takes place.
Exploitation
============
===============/========================================================
Steps to inject the javascript attack:
1) Log-in as a user that has enough privileges to create a web page.
2) In the web page on the top toolbar click on Create.
3) Under the 'Web Pages' section, click on 'Basic Page.'
4) Pick a web page name and click the create button.
5) In IE 7, an Edit Content Link appears in the upper right hand corner.
Click on it and it should open up a "Rich Text Editor -- Webpage
Dialog" window.
6) Add a picture to the page, and in the 'Picture Source' enter the
following:
"""></P></div></td><script>[your javascript here]</script>
7) Save the content, and then click 'Edit Content' again and save it.
Now the javascript is embedded in the page. Also, each time the page
is edited and saved, the javascript is duplicated in the page.
Credits & Gr33ts
================
CAU & HDM
--
I)ruid, CĀ²ISSP
druid@...ghq.org
http://druid.caughq.org
Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists