zoukankan      html  css  js  c++  java
  • CVE-2016-4758: UXSS in Safari's showModalDialog

    I would like to share about details of Safari's UXSS bug(CVE-2016-4758). This bug was fixed in Safari 10.

    https://support.apple.com/en-us/HT207157

    WebKit
    Available for: OS X Yosemite v10.10.5, OS X El Capitan v10.11.6, and macOS Sierra 10.12
    Impact: Visiting a maliciously crafted website may leak sensitive data
    Description: A permissions issue existed in the handling of the location variable. This was addressed though additional ownership checks.
    CVE-2016-4758: Masato Kinugawa of Cure53
    

    FYI, Mobile Safari is not vulnerable because it does not have the showModalDialog method.

    Preconditions for Attack

    To attack using this bug, we need two conditions:
    1. The target page navigates to the relative URL using JavaScript. (e.g. location="/",window.open("/","_blank"))
    2. That navigation is done after the completion of the page loading.
     
    I created the page that satisfies it:

    <script>
    function go_top(){
     location="/index.html";
    }
    </script>
    <button onclick=go_top()>Top Page</button>
    

      

    This page's only purpose is that navigates to https://vulnerabledoma.in/index.html when the user click the "Top Page" button.
    I think there are pages like that everywhere. But using this bug, we can do XSS attack in this conditions.

    The Bug

    Now, let's use the showModalDialog method.
    The following page only opens the target page in a modal dialog:
     
    <script>
    function go(){
     showModalDialog("https://vulnerabledoma.in/safari_uxss_showModalDialog/target.html");
    }
    </script>
    <button onclick=go()>go</button>
    

      

    What will happen when we click the "Top Page" button in the modal dialog? Needless to say, we will go to https://vulnerabledoma.in/index.html. But Safari was different. Surprisingly, Safari navigated to https://l0.cm/index.html. Obviously, Safari mistakes the parent window's base URL for the modal window's base URL.

    (Side Note: This behavior exists in only the JavaScript navigation APIs. For example, the <a> tag and xhr.open("GET",[URL]) used the correct URL. )

    Developing XSS attacks

    According to html5sec.org #42, Safari allows to set the javascript: URL to the base tag. So, I thought that I might be able to XSS if I set the javascript: URL to the base tag in the parent page.

    And my assumption was correct. This is final PoC:

    <!DOCTYPE html>
    <html>
    <head>
    <base href="javascript://%0Aalert%28document.domain%29%2F/">
    </head>
    <body>
    <script>
    function go(){
     showModalDialog("http://vulnerabledoma.in/safari_uxss_showModalDialog/target.html");
    }
    </script>
    <button onclick=go()>go</button>
    </body>
    </html>
    

      

    If it goes well, you can see an alert dialog when you click "Top Page" button, like the following screen shot:

    Yay!

    Conclusion

    I wrote about Safari's UXSS bug. I reported this bug on June 15, 2015. This bug was living in WebKit for over a year after I reported.

    If I find interesting bug, I'll share again :D Thanks!

    referer:http://mksben.l0.cm/2016/09/safari-uxss-showModalDialog.html

  • 相关阅读:
    python3写的exe小工具的准备事项
    信息网站罗列
    you-get下载视频
    sprintboot入门
    linux 常用指令nfs,根据时间删除文件,路由router
    ubuntu下adsl拨号设置
    Hadoop的Archive归档命令使用指南
    MVC5 + EF6 完整入门教程三:EF来了
    MVC5 + EF6 入门完整教程二:从前端的UI开始
    MVC5 + EF6 入门完整教程一:从0开始
  • 原文地址:https://www.cnblogs.com/sevck/p/5918944.html
Copyright © 2011-2022 走看看