31.07.2015 Views

Download

Download

Download

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

130 Chapter 4 • XSS TheoryFigure 4.20 Acrobat Edit URL Dialog BoxType the full path to the well-known PDF file plus some JavaScript. For example:file:///C:/Program%20Files/Adobe/Acrobat%207.0/Resource/ENUtxt.pdf#something=javascript:alert('xss')Press the OK button and make sure that you save the document before you quitAcrobat.The newly created document contains a self-contained exploit that will execute as soonas an unaware victim opens the document for preview.There are a number of limitations,such as the fact that the user will see a browser window showing up. However, keep in mindthat attackers need just a few moments to locate and transfer a sensitive file from the localsystem to a remote collection point. In the worse case, the attacker will be able to performarbitrary code execution via some sort of browser-based vulnerability.QuickTime Hacks for Fun and ProfitApple QuickTime was also affected by a number of XSS issues which led to the appearanceof a XSS worm on MySpace.The XSS issue was found by Petko Petkov, and was widely discussed on the GNUCIT-IZEN Web site. As discovered, the QuickTime application insecurely implements a featurethat can be easily abused.This feature allows movie authors to embed links inside a movie

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!