BugTraq
Universal XSS with PDF files: highly dangerous Jan 03 2007 02:20AM
pdp (architect) (pdp gnucitizen googlemail com) (5 replies)
Re: Universal XSS with PDF files: highly dangerous Jan 08 2007 07:27PM
The Anarcat (anarcat anarcat ath cx)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 04 2007 10:00AM
HASEGAWA Yosuke (yosuke hasegawa gmail com)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 09:54PM
Jean-Jacques Halans (halans gmail com) (2 replies)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 04 2007 12:44AM
Jim Manico (jim manico net) (1 replies)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 04 2007 01:08AM
RSnake (rsnake shocking com)
RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 11:22PM
Larry Seltzer (Larry larryseltzer com)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 08:37AM
sven vetsch disenchant ch (2 replies)
Re: Universal XSS with PDF files: highly dangerous Jan 03 2007 06:01PM
ascii (ascii katamail com)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 10:27AM
pdp (architect) (pdp gnucitizen googlemail com)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 05:17AM
Amit Klein (aksecurity gmail com) (1 replies)
pdp (architect) wrote:
> I will be very quick and just point to links where you can read about
> this issue.
>
> It seams that PDF documents can execute JavaScript code for no
> apparent reason by using the following template:
>
>
> http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_
here
>
>
> You must understand that the attacker doesn't need to have write
> access to the specified PDF document. In order to get an XSS vector
> working you need to have a PDF file hosted on the target and that's
> all about it. The rest is just a matter of your abilities and desires.
>
Amazing, and kudos to Sven Vetsch who found this.

Note that from attack categorization perspective, it appears to be a
twisted example of DOM based XSS
(http://www.webappsec.org/projects/articles/071105.shtml). I suppose PDF
retrieves the URL from the browser (probably from a degenerate DOM the
browser provides it - after all, the document object is available to the
payload JS code!), parses it and uses the fragment. Since fragments are
used, the payload doesn't travel to the target web server (!). I
mentioned the possible use of fragments as a particularly nasty attack
vector (impossible to detect on server) in the "DOM based XSS" writeup.

-Amit

[ reply ]
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 06:15PM
Amit Klein (aksecurity gmail com) (1 replies)
Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous Jan 03 2007 10:03PM
pdp (architect) (pdp gnucitizen googlemail com)


 

Privacy Statement
Copyright 2010, SecurityFocus