Bugtraq mailing list archives

Re: [WEB SECURITY] countermeasure against attacks through HTML shared files


From: "Adrian P." <adrian.pastor () PROCHECKUP com>
Date: Fri, 7 Nov 2008 15:42:43 +0000

Hi Francisco,

It would have been cool to mention Microsoft SharePoint as an example of
a popular file sharing system that allows persistent XSS through shared
HTML files. i.e.:

https://moss.company.foo/_catalogs/users/Attachments/<userID>/evil.html
https://moss.company.foo/<siteName>/<SectionName>/evil.html

Where 'evil.html' would be a page containing JavaScript. i.e.:

<html>
<body>
<script>
alert(document.domain)
</script>

</body>
</html>


Thanks for your paper btw.

fcorella () pomcor com wrote:
Hello,

I wanted to announce a Pomcor white paper that
looks at attacks through HTML shared files in Web
applications and proposes a countermeasure.  These
are essentially XSS attacks, but the usual
defenses against XSS are typically not available,
because shared files cannot be sanitized.

The paper is available at:

http://www.pomcor.com/whitepapers/file_sharing_security.pdf

I have not been able to find much prior work.
What I've found is discussed in Section 2 of the
paper.  If I've missed something, please let me
know.

Thanks,

Francisco Corella




----------------------------------------------------------------------------
Join us on IRC: irc.freenode.net #webappsec

Have a question? Search The Web Security Mailing List Archives: 
http://www.webappsec.org/lists/websecurity/archive/

Subscribe via RSS: 
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]

Join WASC on LinkedIn
http://www.linkedin.com/e/gis/83336/4B20E4374DBA


-- 
Adrian P. | Senior IT Security Consultant | DDI: +44 (0)207 307 5026 |
PGP Key ID: 0x06E653A6


Current thread: