M.O.M.B.Y! (momby) wrote,

  • Mood:

MOMBY-00001001: Myspace Events searchForm "zip" HTML insertion

Advisory MOMBY-00001001: Myspace Events searchForm "zip" HTML insertion
Press Embargo until April 10, 2007

Noobs: ***
 LOLs: ****
 0wnz: ***

It is possible to break out of the zip parameter the e search form on http://events.myspace.com using simple quote insertion, allowing for somewhat arbitrary HTML. The form is presented here: http://events.myspace.com/index.cfm?fuseaction=events&Mytoken=x.

The filtering that is available does limit the usability of this vulnerabilty somewhat; quick manual auditing of script tags, expression attributes, et cetera, reveals that there is little room for manuvering in this attack. The filtering of whitespace makes this vector especially difficult to work with. However, for Firefox, we are able to come up with the below:

Screenshot: http://pics.livejournal.com/momby/pic/0000btbr

This is the code to produce the html:

<FORM name="searchForm" action="http://events.myspace.com/index.cfm?fuseacti
on=events&Mytoken=x" method="post">
 <INPUT type="hidden" size=100 value='"></div></div><span/
"center">Win	A	Date	With	Tila	Tequila!!</h1><div/align="center">
tila_nguyen_20.jpg"></span	a="' id="eventsearchzip" name="zip" /> <a
href=# onClick="document.searchForm.submit()">Click here for awesomeness!</a>

The above is wrapped horribly -- the bolded red part is the important bit. A simpler demo is to enter ">0wned! in the zip code input field and notice the phrase reflected outside the feild. But that has far fewer boobies. Also note, since this is a POST action, an attacker would need to construct an HTML form like the one above and entice users to click on it. (Attempts to convert to a GET were fruitless.)

In the above, note the use of the slash character as a word seperator -- while this is valid for Firefox 2.x, this does not work for Internet Explorer. However, in some cases, <TAB&tab; characters will work as whitespace for IE, especially for #text nodes. None of this is to say that it's impossible to exploit for IE users; it's just not particularly easy on the fly. No doubt, your local professional Cyber-Terrorist(tm) already has working code for insertion points such as this.

Credit: rMrGvG of sni-labs first reported this HTML insertion vulnerability. Olé!

Tags: event search, html insertion, kinda lame, tila tequila
  • Post a new comment


    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
← Ctrl ← Alt
Ctrl → Alt →
← Ctrl ← Alt
Ctrl → Alt →