Full Disclosure mailing list archives
Fwd: Re: Universal XSS with PDF files: highly dangerous
From: Tõnu Samuel <tonu () jes ee>
Date: Fri, 5 Jan 2007 15:56:46 +0200
Oops, please discart previous post author. I used wrong profile in home desktop :P ---------- Forwarded Message ---------- Subject: Re: [Full-disclosure] Universal XSS with PDF files: highly dangerous Date: Friday 05 January 2007 15:53 From: Kristina Lein <kristina () jes ee> To: full-disclosure () lists grok org uk Cc: "pdp (architect)" <pdp.gnucitizen () googlemail com>, bugtraq () securityfocus com, "Web Security" <websecurity () webappsec org> On Wednesday 03 January 2007 04:20, pdp (architect) wrote:
I will be very quick and just point to links where you can read about this issue. It seams that PDF documents can execute JavaScript code for no apparent reason by using the following template: http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_her e You must understand that the attacker doesn't need to have write access to the specified PDF document. In order to get an XSS vector working you need to have a PDF file hosted on the target and that's all about it. The rest is just a matter of your abilities and desires.
Even more, maybe it is possible to modify content of PDF with this method. Some way (I have not tried though) described here; http://www.planetpdf.com/developer/article.asp?ContentID=6904 Need to write POC Also I have to tell that my firefox crashed when I appended some random document.write('foobar') to exploit. I suppose it wrote it to PDF memory?! In this case we maybe can also execute code? Scary. Tõnu ------------------------------------------------------- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Fwd: Re: Universal XSS with PDF files: highly dangerous Tõnu Samuel (Jan 05)