IT 计算机信息网络安全技术

IT 技术
计算机安全
网络网站安全
白帽子漏洞

© IT 计算机信息网络安全技术 | Powered by LOFTER

Mozilla Online Website Two Sub-Domains XSS (Cross-site Scripting) Bugs ( All URLs Under the Two Domains)





Domains:
http://lxr.mozilla.org/
http://mxr.mozilla.org/
(The two domains above are almost the same)





Websites information:
"lxr.mozilla.org, mxr.mozilla.org are cross references designed to display the Mozilla source code. The sources displayed are those that are currently checked in to the mainline of the mozilla.org CVS server, Mercurial Server, and Subversion Server; these pages are updated many times a day, so they should be pretty close to the latest‑and‑greatest." (from Mozilla)


"Mozilla is a free-software community which produces the Firefox web browser. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, with only minor exceptions. The community is supported institutionally by the Mozilla Foundation and its tax-paying subsidiary, the Mozilla Corporation. In addition to the Firefox browser, Mozilla also produces Thunderbird, Firefox Mobile, the Firefox OS mobile operating system, the bug tracking system Bugzilla and a number of other projects." (Wikipedia)






(1) Vulnerability description:
Mozilla website has a computer cyber security problem. Hacker can attack it by XSS bugs. Here is the description of XSS: "Hackers are constantly experimenting with a wide repertoire of hacking techniques to compromise websites and web applications and make off with a treasure trove of sensitive data including credit card numbers, social security numbers and even medical records. Cross-site Scripting (also known as XSS or CSS) is generally believed to be one of the most common application layer hacking techniques Cross-site Scripting allows an attacker to embed malicious JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable dynamic page to fool the user, executing the script on his machine in order to gather data. The use of XSS might compromise private information, manipulate or steal cookies, create requests that can be mistaken for those of a valid user, or execute malicious code on the end-user systems. The data is usually formatted as a hyperlink containing malicious content and which is distributed over any possible means on the internet." (Acunetix)




All pages under the following two URLs are vulnerable.
http://lxr.mozilla.org/mozilla-central/source
http://mxr.mozilla.org/mozilla-central/source




This means all URLs under the above two domains can be used for XSS attacks targeting Mozilla's users.




Since there are large number of pages under them. Meanwhile, the contents of the two domains vary. This makes the vulnerability very dangerous. Attackers can use different URLs to design XSS attacks to Mozilla's variety class of users.





Discovered and Reported by:
Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and Mathematical Sciences (SPMS), Nanyang Technological University (NTU), Singapore. (@justqdjing)
http://www.tetraph.com/wangjing/

 






More Details:

http://lists.openwall.net/full-disclosure/2014/10/20/8

http://seclists.org/fulldisclosure/2014/Oct/92

http://www.tetraph.com/blog/xss-vulnerability/mozilla-xss

http://frenchairing.blogspot.fr/2015/06/mozilla-two-sub-domains.html

http://tetraph.blog.163.com/blog/static/2346030512014101115642885/

https://tetraph.wordpress.com/2014/11/26/mozilla-two-sub-domains-xss

http://tetraph.blogspot.com/2014/10/mozilla-mozillaorg-domains.html

http://whitehatview.tumblr.com/post/103540568486/two-of-mozillas-cross

http://diebiyi.com/articles/security/xss-vulnerability/mozilla-xss

http://www.inzeed.com/kaleidoscope/xss-vulnerability/mozilla-xss

http://www.tetraph.com/blog/xss-vulnerability/mozilla-xss

http://webtechhut.blogspot.com/2015/06/mozilla-sub-domains.html

 



评论
热度 ( 9 )
  1. 计算机网络技术IT 计算机信息网络安全技术 转载了此图片  到 绿意蛙鸣