[14341] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Malicious-HTML vulnerabilities at deja.com

daemon@ATHENA.MIT.EDU (Geert Altena)
Mon Mar 20 04:37:26 2000

Mail-Followup-To: Niall Smart <niall@POBOX.COM>, BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000317123145.A11540@uttnarag.arago>
Date:         Fri, 17 Mar 2000 12:31:46 +0100
Reply-To: Geert Altena <geert@uttnarag.tn.utwente.nl>
From: Geert Altena <geert@UTTNARAG.TN.UTWENTE.NL>
X-To:         Niall Smart <niall@POBOX.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <38CFC424.BB4707A8@pobox.com>; from niall@POBOX.COM on Fri,
              Mar 17, 2000 at 12:06:21PM +0100

You, Niall Smart, <niall@POBOX.COM>, wrote:

> deja.com does not always escape meta-characters when displaying
                ^^^^^^^^^^
> Usenet articles.  Specifically, the article view page
> (http://www.deja.com/getdoc.xp) and the thread view page
> (http://www.deja.com/viewthread.xp) display the subject of the
> article "as is" between title tags.
>
> Examples
> ========
>
> JavaScript popup:
>
>   http://www.deja.com/getdoc.xp?AN=591804116

Comes out as (copy/paste from netscape):
------------
>> Forum: alt.test
>> Thread: </title><script
>> src="http://www.in-design.com/~nsmart/foo.js"></script><body
>> onLoad="return bar()">
>> Message 1 of 1

Subject: </title><script src="http://www.in-design.com/~nsmart/foo.js">
         </script><body onLoad="return bar()">
Date: 03/01/2000
Author: regkey <regkey@yahoo.com>
--------------

I have javascript enabled, no popup.

> Redirection using meta tag:
>
>   http://www.deja.com/getdoc.xp?AN=591833344

Comes out as:
-----------------
>> Forum: alt.test
>> Thread: </title><meta http-equiv="refresh"
           content="0;url=http://www.in-design.com/~nsmart/deja.html">
>> Message 1 of 1

Subject: </title><meta http-equiv="refresh"
         content="0;url=http://www.in-design.com/~nsmart/deja.html">
Date: 03/01/2000
Author: regkey <regkey@yahoo.com>
--------------------

No redirection here to www.in-design.com.

Looking at the source, in both cases (javascript and meta rerefresh) the
"<" and ">" are properly replaced by "&lt;" and "&gt;" eliminating the
vulnerabilities you mentioned. Same thing applies then I get the article
via powersearch.

So either someone at Deja reads Bugtraq and did a fix before this reply or
this is a case where things _are_ properly escaped.

Cheers,
\Geert.
--
Geert Altena | Geert@uttnarag.tn.utwente.nl | Coffee, black, no sugar
         Finger for PGPkey : Diffie-Hellman 2048/0xC540C550
  Prediction is difficult, especially of the future. - (Niels Bohr)

home help back first fref pref prev next nref lref last post