oss-sec mailing list archives

Re: Checking existence of firewalled URLs via javascript's script.onload


From: Peter Philip Pettersson <philip.pettersson () gmail com>
Date: Wed, 19 Apr 2023 07:53:14 -0700

Hi George,

There are many ways to make arbitrary HTTP requests through a browser, with
and without Javascript.

Here's a good writeup from 2018 from the makers of Burp Suite:
https://portswigger.net/research/exposing-intranets-with-reliable-browser-based-port-scanning

I wouldn't consider this a vulnerability in the browser.

Btw, I remember your exploits from the early 2000s - good stuff :)

Regards,
Philip

On Wed, Apr 19, 2023 at 6:31 AM Georgi Guninski <gguninski () gmail com> wrote:

There is minor information disclosure vulnerability similar
to nmap in browser.

It is possible to check the existence of firewalled URL U via
the following javascript in a browser:

<script src="U"
    onload="alert('Exists')"
    onerror="alert('Does not exist')">

This might have privacy implication on potentially
"semi-blind CSRF" (XXX does this makes sense?).

Works for me in Firefox, Chrome and Chromium 112.

I believe the issue won't be fixed because it will break
stuff in the mess called internet.

For online test:

https://www.guninski.com/onload2.html

--
guninski:  https://j.ludost.net/resumegg.pdf


Current thread: