lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1207706562.3155.178.camel@localhost>
Date: Tue, 08 Apr 2008 21:02:42 -0500
From: "I)ruid" <druid@...ghq.org>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
	bugtraq <bugtraq@...urityfocus.com>
Subject: CAU-2008-0002: Microsoft Windows SharePoint
	Services Picture	Source XSS

                      ____      ____     __    __
                     /    \    /    \   |  |  |  |
        ----====####/  /\__\##/  /\  \##|  |##|  |####====----
                   |  |      |  |__|  | |  |  |  |
                   |  |  ___ |   __   | |  |  |  |
  ------======######\  \/  /#|  |##|  |#|  |##|  |######======------
                     \____/  |__|  |__|  \______/
                                                     
                    Computer Academic Underground
                        http://www.caughq.org
                          Security Advisory 

===============/========================================================
Advisory ID:    CAU-2008-0002
Release Date:   04/08/2008
Title:          Microsoft Windows SharePoint Services Picture Source XSS
Application/OS: Microsoft Windows SharePoint Services 2.0 
Topic:          A stored Cross Site Scripting (XSS) attack is possible
                in Microsoft SharePoint Services 2.0 via picture object
                source when adding a picture object to a page.
Vendor Status:  Not Notified
Attributes:     XSS, Web Service, Microsoft Tuesday
Advisory URL:   http://www.caughq.org/advisories/CAU-2008-0002.txt
Author/Email:   OneIdBeagl3 <oneidbeagl3 (at) caughq.org>
===============/========================================================

Overview
========

A stored XSS vulnerability exists in Microsoft Windows SharePoint
Services 2.0 where a malicious user can bypass sanitization and inject 
javascript into a web page they are editing. Under normal circumstances,
SharePoint does not permit users to include javascript in any submitted
content.


Impact
======

If javascript is enabled in a user's browser, when the user views the
page, the javascript will be executed.  As a result, an attacker could
potentially steal credentials and takeover the browser or machine of any
user who views the page. 


Affected Systems
================

Microsoft Windows Share Point Services 2.0


Technical Explanation
=====================

The string below is not properly sanitized when the web page is saved
after adding a picture using the application's text editor:

	"""></P></div></td><script>alert("bingo");</script>

The text between the script tags will be injected into the page upon
each successful edit and save operation, after the page is initially
saved.  On initial testing, there did not appear to be a size limit for
javascript text that could be injected.  The string must also use all
double quotes when quotes are needed.


Solution & Recommendations
==========================

Unless editing web pages in SharePoint 2.0 is necessary, disable this
feature.  If the feature is necessary, ensure users must authenticate to
a service before giving them the privilege to create or edit pages, and
only afford users the privileges if they need to create or edit pages.
This practice will help leave an audit trail to determine which account
was used to create a malicious web page if an incident takes place.


Exploitation
============

===============/========================================================
Steps to inject the javascript attack:

1) Log-in as a user that has enough privileges to create a web page.

2) In the web page on the top toolbar click on Create.

3) Under the 'Web Pages' section, click on 'Basic Page.'

4) Pick a web page name and click the create button.

5) In IE 7, an Edit Content Link appears in the upper right hand corner.
   Click on it and it should open up a "Rich Text Editor -- Webpage
   Dialog" window.

6) Add a picture to the page, and in the 'Picture Source' enter the
   following:

     """></P></div></td><script>[your javascript here]</script>

7) Save the content, and then click 'Edit Content' again and save it.
   Now the javascript is embedded in the page.  Also, each time the page
   is edited and saved, the javascript is duplicated in the page.


Credits & Gr33ts
================

CAU & HDM


-- 
I)ruid, CĀ²ISSP
druid@...ghq.org
http://druid.caughq.org

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ